May 13 00:50:16.820850 kernel: Linux version 5.15.181-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon May 12 23:08:12 -00 2025 May 13 00:50:16.820867 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=b36b4a233fdb797f33aa4a04cfdf4a35ceaebd893b04da45dfb96d44a18c6166 May 13 00:50:16.820877 kernel: BIOS-provided physical RAM map: May 13 00:50:16.820883 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable May 13 00:50:16.820888 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000007fffff] usable May 13 00:50:16.820893 kernel: BIOS-e820: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS May 13 00:50:16.820900 kernel: BIOS-e820: [mem 0x0000000000808000-0x000000000080afff] usable May 13 00:50:16.820906 kernel: BIOS-e820: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS May 13 00:50:16.820911 kernel: BIOS-e820: [mem 0x000000000080c000-0x000000000080ffff] usable May 13 00:50:16.820917 kernel: BIOS-e820: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS May 13 00:50:16.820923 kernel: BIOS-e820: [mem 0x0000000000900000-0x000000009c8eefff] usable May 13 00:50:16.820928 kernel: BIOS-e820: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved May 13 00:50:16.820934 kernel: BIOS-e820: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data May 13 00:50:16.820939 kernel: BIOS-e820: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS May 13 00:50:16.820946 kernel: BIOS-e820: [mem 0x000000009cbff000-0x000000009cf3ffff] usable May 13 00:50:16.820953 kernel: BIOS-e820: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved May 13 00:50:16.820959 kernel: BIOS-e820: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS May 13 00:50:16.820965 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved May 13 00:50:16.820971 kernel: NX (Execute Disable) protection: active May 13 00:50:16.820977 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable May 13 00:50:16.820983 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable May 13 00:50:16.820988 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable May 13 00:50:16.820994 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable May 13 00:50:16.820999 kernel: extended physical RAM map: May 13 00:50:16.821005 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable May 13 00:50:16.821012 kernel: reserve setup_data: [mem 0x0000000000100000-0x00000000007fffff] usable May 13 00:50:16.821029 kernel: reserve setup_data: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS May 13 00:50:16.821035 kernel: reserve setup_data: [mem 0x0000000000808000-0x000000000080afff] usable May 13 00:50:16.821041 kernel: reserve setup_data: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS May 13 00:50:16.821046 kernel: reserve setup_data: [mem 0x000000000080c000-0x000000000080ffff] usable May 13 00:50:16.821052 kernel: reserve setup_data: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS May 13 00:50:16.821058 kernel: reserve setup_data: [mem 0x0000000000900000-0x000000009b438017] usable May 13 00:50:16.821064 kernel: reserve setup_data: [mem 0x000000009b438018-0x000000009b474e57] usable May 13 00:50:16.821070 kernel: reserve setup_data: [mem 0x000000009b474e58-0x000000009b475017] usable May 13 00:50:16.821075 kernel: reserve setup_data: [mem 0x000000009b475018-0x000000009b47ec57] usable May 13 00:50:16.821081 kernel: reserve setup_data: [mem 0x000000009b47ec58-0x000000009c8eefff] usable May 13 00:50:16.821088 kernel: reserve setup_data: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved May 13 00:50:16.821094 kernel: reserve setup_data: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data May 13 00:50:16.821100 kernel: reserve setup_data: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS May 13 00:50:16.821106 kernel: reserve setup_data: [mem 0x000000009cbff000-0x000000009cf3ffff] usable May 13 00:50:16.821114 kernel: reserve setup_data: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved May 13 00:50:16.821121 kernel: reserve setup_data: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS May 13 00:50:16.821127 kernel: reserve setup_data: [mem 0x00000000b0000000-0x00000000bfffffff] reserved May 13 00:50:16.821134 kernel: efi: EFI v2.70 by EDK II May 13 00:50:16.821140 kernel: efi: SMBIOS=0x9c9ab000 ACPI=0x9cb7e000 ACPI 2.0=0x9cb7e014 MEMATTR=0x9b673018 RNG=0x9cb73018 May 13 00:50:16.821147 kernel: random: crng init done May 13 00:50:16.821153 kernel: SMBIOS 2.8 present. May 13 00:50:16.821159 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015 May 13 00:50:16.821166 kernel: Hypervisor detected: KVM May 13 00:50:16.821172 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 13 00:50:16.821178 kernel: kvm-clock: cpu 0, msr 4e196001, primary cpu clock May 13 00:50:16.821184 kernel: kvm-clock: using sched offset of 3970675881 cycles May 13 00:50:16.821193 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 13 00:50:16.821200 kernel: tsc: Detected 2794.748 MHz processor May 13 00:50:16.821206 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 13 00:50:16.821213 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 13 00:50:16.821219 kernel: last_pfn = 0x9cf40 max_arch_pfn = 0x400000000 May 13 00:50:16.821226 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 13 00:50:16.821232 kernel: Using GB pages for direct mapping May 13 00:50:16.821238 kernel: Secure boot disabled May 13 00:50:16.821245 kernel: ACPI: Early table checksum verification disabled May 13 00:50:16.821253 kernel: ACPI: RSDP 0x000000009CB7E014 000024 (v02 BOCHS ) May 13 00:50:16.821260 kernel: ACPI: XSDT 0x000000009CB7D0E8 000054 (v01 BOCHS BXPC 00000001 01000013) May 13 00:50:16.821266 kernel: ACPI: FACP 0x000000009CB79000 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:50:16.821273 kernel: ACPI: DSDT 0x000000009CB7A000 0021A8 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:50:16.821279 kernel: ACPI: FACS 0x000000009CBDD000 000040 May 13 00:50:16.821286 kernel: ACPI: APIC 0x000000009CB78000 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:50:16.821292 kernel: ACPI: HPET 0x000000009CB77000 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:50:16.821299 kernel: ACPI: MCFG 0x000000009CB76000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:50:16.821305 kernel: ACPI: WAET 0x000000009CB75000 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 00:50:16.821312 kernel: ACPI: BGRT 0x000000009CB74000 000038 (v01 INTEL EDK2 00000002 01000013) May 13 00:50:16.821319 kernel: ACPI: Reserving FACP table memory at [mem 0x9cb79000-0x9cb790f3] May 13 00:50:16.821325 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cb7a000-0x9cb7c1a7] May 13 00:50:16.821332 kernel: ACPI: Reserving FACS table memory at [mem 0x9cbdd000-0x9cbdd03f] May 13 00:50:16.821338 kernel: ACPI: Reserving APIC table memory at [mem 0x9cb78000-0x9cb7808f] May 13 00:50:16.821344 kernel: ACPI: Reserving HPET table memory at [mem 0x9cb77000-0x9cb77037] May 13 00:50:16.821351 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cb76000-0x9cb7603b] May 13 00:50:16.821357 kernel: ACPI: Reserving WAET table memory at [mem 0x9cb75000-0x9cb75027] May 13 00:50:16.821363 kernel: ACPI: Reserving BGRT table memory at [mem 0x9cb74000-0x9cb74037] May 13 00:50:16.821371 kernel: No NUMA configuration found May 13 00:50:16.821377 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cf3ffff] May 13 00:50:16.821384 kernel: NODE_DATA(0) allocated [mem 0x9cea6000-0x9ceabfff] May 13 00:50:16.821390 kernel: Zone ranges: May 13 00:50:16.821396 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 13 00:50:16.821403 kernel: DMA32 [mem 0x0000000001000000-0x000000009cf3ffff] May 13 00:50:16.821409 kernel: Normal empty May 13 00:50:16.821415 kernel: Movable zone start for each node May 13 00:50:16.821422 kernel: Early memory node ranges May 13 00:50:16.821429 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] May 13 00:50:16.821435 kernel: node 0: [mem 0x0000000000100000-0x00000000007fffff] May 13 00:50:16.821442 kernel: node 0: [mem 0x0000000000808000-0x000000000080afff] May 13 00:50:16.821448 kernel: node 0: [mem 0x000000000080c000-0x000000000080ffff] May 13 00:50:16.821454 kernel: node 0: [mem 0x0000000000900000-0x000000009c8eefff] May 13 00:50:16.821461 kernel: node 0: [mem 0x000000009cbff000-0x000000009cf3ffff] May 13 00:50:16.821467 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cf3ffff] May 13 00:50:16.821473 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 13 00:50:16.821479 kernel: On node 0, zone DMA: 96 pages in unavailable ranges May 13 00:50:16.821486 kernel: On node 0, zone DMA: 8 pages in unavailable ranges May 13 00:50:16.821493 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 13 00:50:16.821500 kernel: On node 0, zone DMA: 240 pages in unavailable ranges May 13 00:50:16.821507 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges May 13 00:50:16.821513 kernel: On node 0, zone DMA32: 12480 pages in unavailable ranges May 13 00:50:16.821519 kernel: ACPI: PM-Timer IO Port: 0x608 May 13 00:50:16.821526 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 13 00:50:16.821532 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 May 13 00:50:16.821539 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) May 13 00:50:16.821545 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 13 00:50:16.821553 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 13 00:50:16.821559 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 13 00:50:16.821565 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 13 00:50:16.821572 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 13 00:50:16.821578 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 May 13 00:50:16.821584 kernel: TSC deadline timer available May 13 00:50:16.821591 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs May 13 00:50:16.821597 kernel: kvm-guest: KVM setup pv remote TLB flush May 13 00:50:16.821604 kernel: kvm-guest: setup PV sched yield May 13 00:50:16.821611 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices May 13 00:50:16.821618 kernel: Booting paravirtualized kernel on KVM May 13 00:50:16.821628 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 13 00:50:16.821636 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 May 13 00:50:16.821643 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 May 13 00:50:16.821649 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 May 13 00:50:16.821656 kernel: pcpu-alloc: [0] 0 1 2 3 May 13 00:50:16.821662 kernel: kvm-guest: setup async PF for cpu 0 May 13 00:50:16.821675 kernel: kvm-guest: stealtime: cpu 0, msr 9b21c0c0 May 13 00:50:16.821682 kernel: kvm-guest: PV spinlocks enabled May 13 00:50:16.821689 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) May 13 00:50:16.821695 kernel: Built 1 zonelists, mobility grouping on. Total pages: 629759 May 13 00:50:16.821703 kernel: Policy zone: DMA32 May 13 00:50:16.821711 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=b36b4a233fdb797f33aa4a04cfdf4a35ceaebd893b04da45dfb96d44a18c6166 May 13 00:50:16.821719 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 13 00:50:16.821726 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 13 00:50:16.821733 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 13 00:50:16.821740 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 13 00:50:16.821747 kernel: Memory: 2397432K/2567000K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47456K init, 4124K bss, 169308K reserved, 0K cma-reserved) May 13 00:50:16.821754 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 May 13 00:50:16.821761 kernel: ftrace: allocating 34584 entries in 136 pages May 13 00:50:16.821768 kernel: ftrace: allocated 136 pages with 2 groups May 13 00:50:16.821774 kernel: rcu: Hierarchical RCU implementation. May 13 00:50:16.821782 kernel: rcu: RCU event tracing is enabled. May 13 00:50:16.821789 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. May 13 00:50:16.821797 kernel: Rude variant of Tasks RCU enabled. May 13 00:50:16.821803 kernel: Tracing variant of Tasks RCU enabled. May 13 00:50:16.821810 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 13 00:50:16.821817 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 May 13 00:50:16.821824 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 May 13 00:50:16.821831 kernel: Console: colour dummy device 80x25 May 13 00:50:16.821837 kernel: printk: console [ttyS0] enabled May 13 00:50:16.821844 kernel: ACPI: Core revision 20210730 May 13 00:50:16.821851 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns May 13 00:50:16.821859 kernel: APIC: Switch to symmetric I/O mode setup May 13 00:50:16.821866 kernel: x2apic enabled May 13 00:50:16.821872 kernel: Switched APIC routing to physical x2apic. May 13 00:50:16.821879 kernel: kvm-guest: setup PV IPIs May 13 00:50:16.821886 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 13 00:50:16.821892 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized May 13 00:50:16.821899 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) May 13 00:50:16.821906 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated May 13 00:50:16.821913 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 May 13 00:50:16.821921 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 May 13 00:50:16.821927 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 13 00:50:16.821934 kernel: Spectre V2 : Mitigation: Retpolines May 13 00:50:16.821941 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 13 00:50:16.821948 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls May 13 00:50:16.821954 kernel: RETBleed: Mitigation: untrained return thunk May 13 00:50:16.821961 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier May 13 00:50:16.821968 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp May 13 00:50:16.821975 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 13 00:50:16.821983 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 13 00:50:16.821989 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 13 00:50:16.821996 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 13 00:50:16.822003 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. May 13 00:50:16.822010 kernel: Freeing SMP alternatives memory: 32K May 13 00:50:16.822016 kernel: pid_max: default: 32768 minimum: 301 May 13 00:50:16.822032 kernel: LSM: Security Framework initializing May 13 00:50:16.822038 kernel: SELinux: Initializing. May 13 00:50:16.822061 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 13 00:50:16.822070 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 13 00:50:16.822077 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) May 13 00:50:16.822083 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. May 13 00:50:16.822090 kernel: ... version: 0 May 13 00:50:16.822097 kernel: ... bit width: 48 May 13 00:50:16.822103 kernel: ... generic registers: 6 May 13 00:50:16.822110 kernel: ... value mask: 0000ffffffffffff May 13 00:50:16.822117 kernel: ... max period: 00007fffffffffff May 13 00:50:16.822124 kernel: ... fixed-purpose events: 0 May 13 00:50:16.822131 kernel: ... event mask: 000000000000003f May 13 00:50:16.822138 kernel: signal: max sigframe size: 1776 May 13 00:50:16.822144 kernel: rcu: Hierarchical SRCU implementation. May 13 00:50:16.822151 kernel: smp: Bringing up secondary CPUs ... May 13 00:50:16.822158 kernel: x86: Booting SMP configuration: May 13 00:50:16.822165 kernel: .... node #0, CPUs: #1 May 13 00:50:16.822171 kernel: kvm-clock: cpu 1, msr 4e196041, secondary cpu clock May 13 00:50:16.822178 kernel: kvm-guest: setup async PF for cpu 1 May 13 00:50:16.822185 kernel: kvm-guest: stealtime: cpu 1, msr 9b29c0c0 May 13 00:50:16.822192 kernel: #2 May 13 00:50:16.822199 kernel: kvm-clock: cpu 2, msr 4e196081, secondary cpu clock May 13 00:50:16.822206 kernel: kvm-guest: setup async PF for cpu 2 May 13 00:50:16.822213 kernel: kvm-guest: stealtime: cpu 2, msr 9b31c0c0 May 13 00:50:16.822219 kernel: #3 May 13 00:50:16.822226 kernel: kvm-clock: cpu 3, msr 4e1960c1, secondary cpu clock May 13 00:50:16.822233 kernel: kvm-guest: setup async PF for cpu 3 May 13 00:50:16.822239 kernel: kvm-guest: stealtime: cpu 3, msr 9b39c0c0 May 13 00:50:16.822246 kernel: smp: Brought up 1 node, 4 CPUs May 13 00:50:16.822253 kernel: smpboot: Max logical packages: 1 May 13 00:50:16.822260 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) May 13 00:50:16.822267 kernel: devtmpfs: initialized May 13 00:50:16.822274 kernel: x86/mm: Memory block size: 128MB May 13 00:50:16.822281 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00800000-0x00807fff] (32768 bytes) May 13 00:50:16.822288 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x0080b000-0x0080bfff] (4096 bytes) May 13 00:50:16.822295 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00810000-0x008fffff] (983040 bytes) May 13 00:50:16.822302 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cb7f000-0x9cbfefff] (524288 bytes) May 13 00:50:16.822308 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cf60000-0x9cffffff] (655360 bytes) May 13 00:50:16.822315 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 13 00:50:16.822323 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) May 13 00:50:16.822330 kernel: pinctrl core: initialized pinctrl subsystem May 13 00:50:16.822337 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 13 00:50:16.822343 kernel: audit: initializing netlink subsys (disabled) May 13 00:50:16.822350 kernel: audit: type=2000 audit(1747097416.985:1): state=initialized audit_enabled=0 res=1 May 13 00:50:16.822357 kernel: thermal_sys: Registered thermal governor 'step_wise' May 13 00:50:16.822363 kernel: thermal_sys: Registered thermal governor 'user_space' May 13 00:50:16.822370 kernel: cpuidle: using governor menu May 13 00:50:16.822377 kernel: ACPI: bus type PCI registered May 13 00:50:16.822384 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 13 00:50:16.822391 kernel: dca service started, version 1.12.1 May 13 00:50:16.822398 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) May 13 00:50:16.822405 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 May 13 00:50:16.822411 kernel: PCI: Using configuration type 1 for base access May 13 00:50:16.822418 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 13 00:50:16.822425 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 13 00:50:16.822432 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 13 00:50:16.822440 kernel: ACPI: Added _OSI(Module Device) May 13 00:50:16.822446 kernel: ACPI: Added _OSI(Processor Device) May 13 00:50:16.822453 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 13 00:50:16.822460 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 13 00:50:16.822467 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 13 00:50:16.822473 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 13 00:50:16.822480 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 13 00:50:16.822487 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 13 00:50:16.822494 kernel: ACPI: Interpreter enabled May 13 00:50:16.822500 kernel: ACPI: PM: (supports S0 S3 S5) May 13 00:50:16.822508 kernel: ACPI: Using IOAPIC for interrupt routing May 13 00:50:16.822515 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 13 00:50:16.822521 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F May 13 00:50:16.822528 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 13 00:50:16.822641 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 13 00:50:16.822723 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] May 13 00:50:16.822792 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] May 13 00:50:16.822804 kernel: PCI host bridge to bus 0000:00 May 13 00:50:16.822876 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 13 00:50:16.822939 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 13 00:50:16.823000 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 13 00:50:16.823234 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] May 13 00:50:16.823299 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] May 13 00:50:16.823356 kernel: pci_bus 0000:00: root bus resource [mem 0x800000000-0xfffffffff window] May 13 00:50:16.823422 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 13 00:50:16.823500 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 May 13 00:50:16.823576 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 May 13 00:50:16.823645 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xc0000000-0xc0ffffff pref] May 13 00:50:16.823721 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xc1044000-0xc1044fff] May 13 00:50:16.823787 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] May 13 00:50:16.823854 kernel: pci 0000:00:01.0: BAR 0: assigned to efifb May 13 00:50:16.823925 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 13 00:50:16.823999 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 May 13 00:50:16.824519 kernel: pci 0000:00:02.0: reg 0x10: [io 0x6100-0x611f] May 13 00:50:16.824603 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xc1043000-0xc1043fff] May 13 00:50:16.824678 kernel: pci 0000:00:02.0: reg 0x20: [mem 0x800000000-0x800003fff 64bit pref] May 13 00:50:16.824754 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 May 13 00:50:16.824828 kernel: pci 0000:00:03.0: reg 0x10: [io 0x6000-0x607f] May 13 00:50:16.824896 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc1042000-0xc1042fff] May 13 00:50:16.824962 kernel: pci 0000:00:03.0: reg 0x20: [mem 0x800004000-0x800007fff 64bit pref] May 13 00:50:16.825063 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 May 13 00:50:16.825134 kernel: pci 0000:00:04.0: reg 0x10: [io 0x60e0-0x60ff] May 13 00:50:16.825201 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc1041000-0xc1041fff] May 13 00:50:16.825266 kernel: pci 0000:00:04.0: reg 0x20: [mem 0x800008000-0x80000bfff 64bit pref] May 13 00:50:16.825335 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfffc0000-0xffffffff pref] May 13 00:50:16.825408 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 May 13 00:50:16.825473 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO May 13 00:50:16.825546 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 May 13 00:50:16.825612 kernel: pci 0000:00:1f.2: reg 0x20: [io 0x60c0-0x60df] May 13 00:50:16.825686 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xc1040000-0xc1040fff] May 13 00:50:16.825758 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 May 13 00:50:16.825826 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x6080-0x60bf] May 13 00:50:16.825836 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 13 00:50:16.825843 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 13 00:50:16.825850 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 13 00:50:16.825857 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 13 00:50:16.825864 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 May 13 00:50:16.825871 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 May 13 00:50:16.825878 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 May 13 00:50:16.825886 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 May 13 00:50:16.825893 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 May 13 00:50:16.825900 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 May 13 00:50:16.825906 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 May 13 00:50:16.825913 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 May 13 00:50:16.825920 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 May 13 00:50:16.825927 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 May 13 00:50:16.825934 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 May 13 00:50:16.825940 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 May 13 00:50:16.825948 kernel: iommu: Default domain type: Translated May 13 00:50:16.825955 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 13 00:50:16.826048 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device May 13 00:50:16.826117 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 13 00:50:16.826183 kernel: pci 0000:00:01.0: vgaarb: bridge control possible May 13 00:50:16.826191 kernel: vgaarb: loaded May 13 00:50:16.826199 kernel: pps_core: LinuxPPS API ver. 1 registered May 13 00:50:16.826206 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 13 00:50:16.826212 kernel: PTP clock support registered May 13 00:50:16.826222 kernel: Registered efivars operations May 13 00:50:16.826229 kernel: PCI: Using ACPI for IRQ routing May 13 00:50:16.826236 kernel: PCI: pci_cache_line_size set to 64 bytes May 13 00:50:16.826242 kernel: e820: reserve RAM buffer [mem 0x0080b000-0x008fffff] May 13 00:50:16.826249 kernel: e820: reserve RAM buffer [mem 0x00810000-0x008fffff] May 13 00:50:16.826256 kernel: e820: reserve RAM buffer [mem 0x9b438018-0x9bffffff] May 13 00:50:16.826262 kernel: e820: reserve RAM buffer [mem 0x9b475018-0x9bffffff] May 13 00:50:16.826269 kernel: e820: reserve RAM buffer [mem 0x9c8ef000-0x9fffffff] May 13 00:50:16.826276 kernel: e820: reserve RAM buffer [mem 0x9cf40000-0x9fffffff] May 13 00:50:16.826284 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 May 13 00:50:16.826290 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter May 13 00:50:16.826297 kernel: clocksource: Switched to clocksource kvm-clock May 13 00:50:16.826304 kernel: VFS: Disk quotas dquot_6.6.0 May 13 00:50:16.826311 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 13 00:50:16.826318 kernel: pnp: PnP ACPI init May 13 00:50:16.826389 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved May 13 00:50:16.826399 kernel: pnp: PnP ACPI: found 6 devices May 13 00:50:16.826407 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 13 00:50:16.826414 kernel: NET: Registered PF_INET protocol family May 13 00:50:16.826421 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 13 00:50:16.826428 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 13 00:50:16.826435 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 13 00:50:16.826442 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 13 00:50:16.826449 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 13 00:50:16.826456 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 13 00:50:16.826464 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 13 00:50:16.826471 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 13 00:50:16.826478 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 13 00:50:16.826485 kernel: NET: Registered PF_XDP protocol family May 13 00:50:16.826554 kernel: pci 0000:00:04.0: can't claim BAR 6 [mem 0xfffc0000-0xffffffff pref]: no compatible bridge window May 13 00:50:16.826622 kernel: pci 0000:00:04.0: BAR 6: assigned [mem 0x9d000000-0x9d03ffff pref] May 13 00:50:16.826695 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 13 00:50:16.826769 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 13 00:50:16.826831 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 13 00:50:16.826891 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] May 13 00:50:16.826950 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] May 13 00:50:16.827008 kernel: pci_bus 0000:00: resource 9 [mem 0x800000000-0xfffffffff window] May 13 00:50:16.827017 kernel: PCI: CLS 0 bytes, default 64 May 13 00:50:16.827035 kernel: Initialise system trusted keyrings May 13 00:50:16.827042 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 13 00:50:16.827049 kernel: Key type asymmetric registered May 13 00:50:16.827056 kernel: Asymmetric key parser 'x509' registered May 13 00:50:16.827065 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 13 00:50:16.827072 kernel: io scheduler mq-deadline registered May 13 00:50:16.827086 kernel: io scheduler kyber registered May 13 00:50:16.827094 kernel: io scheduler bfq registered May 13 00:50:16.827101 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 13 00:50:16.827108 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 May 13 00:50:16.827116 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 May 13 00:50:16.827123 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 May 13 00:50:16.827131 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 13 00:50:16.827139 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 13 00:50:16.827146 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 13 00:50:16.827153 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 13 00:50:16.827161 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 13 00:50:16.827233 kernel: rtc_cmos 00:04: RTC can wake from S4 May 13 00:50:16.827243 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 13 00:50:16.827302 kernel: rtc_cmos 00:04: registered as rtc0 May 13 00:50:16.827363 kernel: rtc_cmos 00:04: setting system clock to 2025-05-13T00:50:16 UTC (1747097416) May 13 00:50:16.827427 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs May 13 00:50:16.827436 kernel: efifb: probing for efifb May 13 00:50:16.827443 kernel: efifb: framebuffer at 0xc0000000, using 4000k, total 4000k May 13 00:50:16.827450 kernel: efifb: mode is 1280x800x32, linelength=5120, pages=1 May 13 00:50:16.827457 kernel: efifb: scrolling: redraw May 13 00:50:16.827464 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 May 13 00:50:16.827472 kernel: Console: switching to colour frame buffer device 160x50 May 13 00:50:16.827479 kernel: fb0: EFI VGA frame buffer device May 13 00:50:16.827486 kernel: pstore: Registered efi as persistent store backend May 13 00:50:16.827495 kernel: NET: Registered PF_INET6 protocol family May 13 00:50:16.827502 kernel: Segment Routing with IPv6 May 13 00:50:16.827509 kernel: In-situ OAM (IOAM) with IPv6 May 13 00:50:16.827517 kernel: NET: Registered PF_PACKET protocol family May 13 00:50:16.827524 kernel: Key type dns_resolver registered May 13 00:50:16.827532 kernel: IPI shorthand broadcast: enabled May 13 00:50:16.827540 kernel: sched_clock: Marking stable (412496963, 127149679)->(584322713, -44676071) May 13 00:50:16.827547 kernel: registered taskstats version 1 May 13 00:50:16.827554 kernel: Loading compiled-in X.509 certificates May 13 00:50:16.827562 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.181-flatcar: 52373c12592f53b0567bb941a0a0fec888191095' May 13 00:50:16.827569 kernel: Key type .fscrypt registered May 13 00:50:16.827576 kernel: Key type fscrypt-provisioning registered May 13 00:50:16.827583 kernel: pstore: Using crash dump compression: deflate May 13 00:50:16.827590 kernel: ima: No TPM chip found, activating TPM-bypass! May 13 00:50:16.827598 kernel: ima: Allocated hash algorithm: sha1 May 13 00:50:16.827605 kernel: ima: No architecture policies found May 13 00:50:16.827612 kernel: clk: Disabling unused clocks May 13 00:50:16.827620 kernel: Freeing unused kernel image (initmem) memory: 47456K May 13 00:50:16.827628 kernel: Write protecting the kernel read-only data: 28672k May 13 00:50:16.827635 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 13 00:50:16.827642 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 13 00:50:16.827649 kernel: Run /init as init process May 13 00:50:16.827656 kernel: with arguments: May 13 00:50:16.827664 kernel: /init May 13 00:50:16.827678 kernel: with environment: May 13 00:50:16.827685 kernel: HOME=/ May 13 00:50:16.827692 kernel: TERM=linux May 13 00:50:16.827699 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 13 00:50:16.827709 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 13 00:50:16.827719 systemd[1]: Detected virtualization kvm. May 13 00:50:16.827727 systemd[1]: Detected architecture x86-64. May 13 00:50:16.827735 systemd[1]: Running in initrd. May 13 00:50:16.827743 systemd[1]: No hostname configured, using default hostname. May 13 00:50:16.827750 systemd[1]: Hostname set to . May 13 00:50:16.827758 systemd[1]: Initializing machine ID from VM UUID. May 13 00:50:16.827766 systemd[1]: Queued start job for default target initrd.target. May 13 00:50:16.827774 systemd[1]: Started systemd-ask-password-console.path. May 13 00:50:16.827781 systemd[1]: Reached target cryptsetup.target. May 13 00:50:16.827788 systemd[1]: Reached target paths.target. May 13 00:50:16.827796 systemd[1]: Reached target slices.target. May 13 00:50:16.827804 systemd[1]: Reached target swap.target. May 13 00:50:16.827811 systemd[1]: Reached target timers.target. May 13 00:50:16.827819 systemd[1]: Listening on iscsid.socket. May 13 00:50:16.827827 systemd[1]: Listening on iscsiuio.socket. May 13 00:50:16.827834 systemd[1]: Listening on systemd-journald-audit.socket. May 13 00:50:16.827842 systemd[1]: Listening on systemd-journald-dev-log.socket. May 13 00:50:16.827850 systemd[1]: Listening on systemd-journald.socket. May 13 00:50:16.827859 systemd[1]: Listening on systemd-networkd.socket. May 13 00:50:16.827867 systemd[1]: Listening on systemd-udevd-control.socket. May 13 00:50:16.827874 systemd[1]: Listening on systemd-udevd-kernel.socket. May 13 00:50:16.827882 systemd[1]: Reached target sockets.target. May 13 00:50:16.827889 systemd[1]: Starting kmod-static-nodes.service... May 13 00:50:16.827897 systemd[1]: Finished network-cleanup.service. May 13 00:50:16.827904 systemd[1]: Starting systemd-fsck-usr.service... May 13 00:50:16.827911 systemd[1]: Starting systemd-journald.service... May 13 00:50:16.827919 systemd[1]: Starting systemd-modules-load.service... May 13 00:50:16.827928 systemd[1]: Starting systemd-resolved.service... May 13 00:50:16.827935 systemd[1]: Starting systemd-vconsole-setup.service... May 13 00:50:16.827943 systemd[1]: Finished kmod-static-nodes.service. May 13 00:50:16.827950 systemd[1]: Finished systemd-fsck-usr.service. May 13 00:50:16.827958 kernel: audit: type=1130 audit(1747097416.819:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:16.827965 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 13 00:50:16.827976 systemd-journald[197]: Journal started May 13 00:50:16.828015 systemd-journald[197]: Runtime Journal (/run/log/journal/6c52526acf4a424392682e3221ade1c4) is 6.0M, max 48.4M, 42.4M free. May 13 00:50:16.819000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:16.830110 systemd[1]: Started systemd-journald.service. May 13 00:50:16.830000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:16.831105 systemd[1]: Finished systemd-vconsole-setup.service. May 13 00:50:16.836093 kernel: audit: type=1130 audit(1747097416.830:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:16.836122 kernel: audit: type=1130 audit(1747097416.835:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:16.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:16.835374 systemd-modules-load[198]: Inserted module 'overlay' May 13 00:50:16.840857 kernel: audit: type=1130 audit(1747097416.839:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:16.839000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:16.835531 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 13 00:50:16.840708 systemd[1]: Starting dracut-cmdline-ask.service... May 13 00:50:16.852859 systemd-resolved[199]: Positive Trust Anchors: May 13 00:50:16.852874 systemd-resolved[199]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 13 00:50:16.852902 systemd-resolved[199]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 13 00:50:16.854933 systemd[1]: Finished dracut-cmdline-ask.service. May 13 00:50:16.859353 kernel: audit: type=1130 audit(1747097416.855:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:16.855000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:16.856081 systemd[1]: Starting dracut-cmdline.service... May 13 00:50:16.862546 systemd-resolved[199]: Defaulting to hostname 'linux'. May 13 00:50:16.864193 systemd[1]: Started systemd-resolved.service. May 13 00:50:16.865000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:16.865840 systemd[1]: Reached target nss-lookup.target. May 13 00:50:16.870201 kernel: audit: type=1130 audit(1747097416.865:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:16.870216 dracut-cmdline[215]: dracut-dracut-053 May 13 00:50:16.871500 dracut-cmdline[215]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=b36b4a233fdb797f33aa4a04cfdf4a35ceaebd893b04da45dfb96d44a18c6166 May 13 00:50:16.877976 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 13 00:50:16.882887 systemd-modules-load[198]: Inserted module 'br_netfilter' May 13 00:50:16.883831 kernel: Bridge firewalling registered May 13 00:50:16.900044 kernel: SCSI subsystem initialized May 13 00:50:16.910390 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 13 00:50:16.910418 kernel: device-mapper: uevent: version 1.0.3 May 13 00:50:16.911639 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 13 00:50:16.914278 systemd-modules-load[198]: Inserted module 'dm_multipath' May 13 00:50:16.914968 systemd[1]: Finished systemd-modules-load.service. May 13 00:50:16.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:16.919949 systemd[1]: Starting systemd-sysctl.service... May 13 00:50:16.921418 kernel: audit: type=1130 audit(1747097416.916:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:16.926276 systemd[1]: Finished systemd-sysctl.service. May 13 00:50:16.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:16.931039 kernel: audit: type=1130 audit(1747097416.927:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:16.935045 kernel: Loading iSCSI transport class v2.0-870. May 13 00:50:16.951042 kernel: iscsi: registered transport (tcp) May 13 00:50:16.972074 kernel: iscsi: registered transport (qla4xxx) May 13 00:50:16.972098 kernel: QLogic iSCSI HBA Driver May 13 00:50:17.000423 systemd[1]: Finished dracut-cmdline.service. May 13 00:50:17.001000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:17.002719 systemd[1]: Starting dracut-pre-udev.service... May 13 00:50:17.006204 kernel: audit: type=1130 audit(1747097417.001:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:17.047048 kernel: raid6: avx2x4 gen() 31107 MB/s May 13 00:50:17.064039 kernel: raid6: avx2x4 xor() 8628 MB/s May 13 00:50:17.081038 kernel: raid6: avx2x2 gen() 32717 MB/s May 13 00:50:17.098037 kernel: raid6: avx2x2 xor() 19304 MB/s May 13 00:50:17.115038 kernel: raid6: avx2x1 gen() 26657 MB/s May 13 00:50:17.132039 kernel: raid6: avx2x1 xor() 15367 MB/s May 13 00:50:17.149039 kernel: raid6: sse2x4 gen() 14799 MB/s May 13 00:50:17.166040 kernel: raid6: sse2x4 xor() 7789 MB/s May 13 00:50:17.183038 kernel: raid6: sse2x2 gen() 16485 MB/s May 13 00:50:17.200038 kernel: raid6: sse2x2 xor() 9867 MB/s May 13 00:50:17.217037 kernel: raid6: sse2x1 gen() 12437 MB/s May 13 00:50:17.234410 kernel: raid6: sse2x1 xor() 7766 MB/s May 13 00:50:17.234422 kernel: raid6: using algorithm avx2x2 gen() 32717 MB/s May 13 00:50:17.234431 kernel: raid6: .... xor() 19304 MB/s, rmw enabled May 13 00:50:17.235136 kernel: raid6: using avx2x2 recovery algorithm May 13 00:50:17.247039 kernel: xor: automatically using best checksumming function avx May 13 00:50:17.336044 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 13 00:50:17.344210 systemd[1]: Finished dracut-pre-udev.service. May 13 00:50:17.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:17.345000 audit: BPF prog-id=7 op=LOAD May 13 00:50:17.345000 audit: BPF prog-id=8 op=LOAD May 13 00:50:17.346294 systemd[1]: Starting systemd-udevd.service... May 13 00:50:17.358051 systemd-udevd[401]: Using default interface naming scheme 'v252'. May 13 00:50:17.361783 systemd[1]: Started systemd-udevd.service. May 13 00:50:17.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:17.364093 systemd[1]: Starting dracut-pre-trigger.service... May 13 00:50:17.373431 dracut-pre-trigger[409]: rd.md=0: removing MD RAID activation May 13 00:50:17.396844 systemd[1]: Finished dracut-pre-trigger.service. May 13 00:50:17.398000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:17.399074 systemd[1]: Starting systemd-udev-trigger.service... May 13 00:50:17.429211 systemd[1]: Finished systemd-udev-trigger.service. May 13 00:50:17.430000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:17.461278 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) May 13 00:50:17.467912 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 13 00:50:17.467931 kernel: GPT:9289727 != 19775487 May 13 00:50:17.467940 kernel: GPT:Alternate GPT header not at the end of the disk. May 13 00:50:17.467949 kernel: GPT:9289727 != 19775487 May 13 00:50:17.467957 kernel: GPT: Use GNU Parted to correct GPT errors. May 13 00:50:17.467965 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 00:50:17.471056 kernel: cryptd: max_cpu_qlen set to 1000 May 13 00:50:17.475052 kernel: libata version 3.00 loaded. May 13 00:50:17.482038 kernel: AVX2 version of gcm_enc/dec engaged. May 13 00:50:17.483055 kernel: ahci 0000:00:1f.2: version 3.0 May 13 00:50:17.493535 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 May 13 00:50:17.493548 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode May 13 00:50:17.493632 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only May 13 00:50:17.493719 kernel: AES CTR mode by8 optimization enabled May 13 00:50:17.493729 kernel: scsi host0: ahci May 13 00:50:17.493817 kernel: scsi host1: ahci May 13 00:50:17.493905 kernel: scsi host2: ahci May 13 00:50:17.493988 kernel: scsi host3: ahci May 13 00:50:17.494089 kernel: scsi host4: ahci May 13 00:50:17.494178 kernel: scsi host5: ahci May 13 00:50:17.494259 kernel: ata1: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040100 irq 34 May 13 00:50:17.494269 kernel: ata2: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040180 irq 34 May 13 00:50:17.494278 kernel: ata3: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040200 irq 34 May 13 00:50:17.494287 kernel: ata4: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040280 irq 34 May 13 00:50:17.494295 kernel: ata5: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040300 irq 34 May 13 00:50:17.494306 kernel: ata6: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040380 irq 34 May 13 00:50:17.500802 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 13 00:50:17.508129 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (443) May 13 00:50:17.511509 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 13 00:50:17.514316 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 13 00:50:17.519716 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 13 00:50:17.529132 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 13 00:50:17.531571 systemd[1]: Starting disk-uuid.service... May 13 00:50:17.537962 disk-uuid[527]: Primary Header is updated. May 13 00:50:17.537962 disk-uuid[527]: Secondary Entries is updated. May 13 00:50:17.537962 disk-uuid[527]: Secondary Header is updated. May 13 00:50:17.541413 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 00:50:17.544041 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 00:50:17.547044 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 00:50:17.801324 kernel: ata6: SATA link down (SStatus 0 SControl 300) May 13 00:50:17.801388 kernel: ata1: SATA link down (SStatus 0 SControl 300) May 13 00:50:17.801398 kernel: ata5: SATA link down (SStatus 0 SControl 300) May 13 00:50:17.803050 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) May 13 00:50:17.804054 kernel: ata4: SATA link down (SStatus 0 SControl 300) May 13 00:50:17.805049 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 May 13 00:50:17.805064 kernel: ata3.00: applying bridge limits May 13 00:50:17.806334 kernel: ata3.00: configured for UDMA/100 May 13 00:50:17.811057 kernel: ata2: SATA link down (SStatus 0 SControl 300) May 13 00:50:17.811077 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 May 13 00:50:17.841059 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray May 13 00:50:17.857485 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 May 13 00:50:17.857497 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 May 13 00:50:18.547777 disk-uuid[529]: The operation has completed successfully. May 13 00:50:18.549180 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 00:50:18.567515 systemd[1]: disk-uuid.service: Deactivated successfully. May 13 00:50:18.569000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:18.569000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:18.567598 systemd[1]: Finished disk-uuid.service. May 13 00:50:18.576366 systemd[1]: Starting verity-setup.service... May 13 00:50:18.588062 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" May 13 00:50:18.606442 systemd[1]: Found device dev-mapper-usr.device. May 13 00:50:18.609043 systemd[1]: Mounting sysusr-usr.mount... May 13 00:50:18.610745 systemd[1]: Finished verity-setup.service. May 13 00:50:18.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:18.666036 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 13 00:50:18.666242 systemd[1]: Mounted sysusr-usr.mount. May 13 00:50:18.667705 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 13 00:50:18.669588 systemd[1]: Starting ignition-setup.service... May 13 00:50:18.671525 systemd[1]: Starting parse-ip-for-networkd.service... May 13 00:50:18.677795 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 13 00:50:18.677825 kernel: BTRFS info (device vda6): using free space tree May 13 00:50:18.677835 kernel: BTRFS info (device vda6): has skinny extents May 13 00:50:18.685667 systemd[1]: mnt-oem.mount: Deactivated successfully. May 13 00:50:18.693182 systemd[1]: Finished ignition-setup.service. May 13 00:50:18.695327 systemd[1]: Starting ignition-fetch-offline.service... May 13 00:50:18.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:18.730567 ignition[641]: Ignition 2.14.0 May 13 00:50:18.730579 ignition[641]: Stage: fetch-offline May 13 00:50:18.730654 ignition[641]: no configs at "/usr/lib/ignition/base.d" May 13 00:50:18.730663 ignition[641]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:50:18.730750 ignition[641]: parsed url from cmdline: "" May 13 00:50:18.730753 ignition[641]: no config URL provided May 13 00:50:18.730757 ignition[641]: reading system config file "/usr/lib/ignition/user.ign" May 13 00:50:18.730763 ignition[641]: no config at "/usr/lib/ignition/user.ign" May 13 00:50:18.730778 ignition[641]: op(1): [started] loading QEMU firmware config module May 13 00:50:18.730785 ignition[641]: op(1): executing: "modprobe" "qemu_fw_cfg" May 13 00:50:18.738368 ignition[641]: op(1): [finished] loading QEMU firmware config module May 13 00:50:18.739777 ignition[641]: parsing config with SHA512: ebf2bc9e1e8fefea00ff74e695b124297e204a8fb5a56b7c29bf3ce7737872d5c148674b8c75056757c31e12c098ba0a835ab71fed59941c3ccbd50efdf1aabd May 13 00:50:18.739549 systemd[1]: Finished parse-ip-for-networkd.service. May 13 00:50:18.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:18.741000 audit: BPF prog-id=9 op=LOAD May 13 00:50:18.742216 systemd[1]: Starting systemd-networkd.service... May 13 00:50:18.747638 unknown[641]: fetched base config from "system" May 13 00:50:18.748511 unknown[641]: fetched user config from "qemu" May 13 00:50:18.749674 ignition[641]: fetch-offline: fetch-offline passed May 13 00:50:18.750652 ignition[641]: Ignition finished successfully May 13 00:50:18.752596 systemd[1]: Finished ignition-fetch-offline.service. May 13 00:50:18.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:18.764796 systemd-networkd[722]: lo: Link UP May 13 00:50:18.766000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:18.764805 systemd-networkd[722]: lo: Gained carrier May 13 00:50:18.765190 systemd-networkd[722]: Enumeration completed May 13 00:50:18.765248 systemd[1]: Started systemd-networkd.service. May 13 00:50:18.765376 systemd-networkd[722]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 13 00:50:18.766691 systemd[1]: Reached target network.target. May 13 00:50:18.767051 systemd-networkd[722]: eth0: Link UP May 13 00:50:18.774000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:18.767055 systemd-networkd[722]: eth0: Gained carrier May 13 00:50:18.767298 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 13 00:50:18.777199 ignition[724]: Ignition 2.14.0 May 13 00:50:18.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:18.767898 systemd[1]: Starting ignition-kargs.service... May 13 00:50:18.781639 iscsid[734]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 13 00:50:18.781639 iscsid[734]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log May 13 00:50:18.781639 iscsid[734]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 13 00:50:18.781639 iscsid[734]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 13 00:50:18.781639 iscsid[734]: If using hardware iscsi like qla4xxx this message can be ignored. May 13 00:50:18.781639 iscsid[734]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 13 00:50:18.781639 iscsid[734]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 13 00:50:18.789000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:18.777204 ignition[724]: Stage: kargs May 13 00:50:18.769498 systemd[1]: Starting iscsiuio.service... May 13 00:50:18.777287 ignition[724]: no configs at "/usr/lib/ignition/base.d" May 13 00:50:18.773651 systemd[1]: Started iscsiuio.service. May 13 00:50:18.797000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:18.777295 ignition[724]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:50:18.775534 systemd[1]: Starting iscsid.service... May 13 00:50:18.778010 ignition[724]: kargs: kargs passed May 13 00:50:18.779041 systemd[1]: Finished ignition-kargs.service. May 13 00:50:18.778053 ignition[724]: Ignition finished successfully May 13 00:50:18.781820 systemd[1]: Starting ignition-disks.service... May 13 00:50:18.788353 ignition[735]: Ignition 2.14.0 May 13 00:50:18.784077 systemd-networkd[722]: eth0: DHCPv4 address 10.0.0.142/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 13 00:50:18.788358 ignition[735]: Stage: disks May 13 00:50:18.786864 systemd[1]: Started iscsid.service. May 13 00:50:18.788433 ignition[735]: no configs at "/usr/lib/ignition/base.d" May 13 00:50:18.794392 systemd[1]: Finished ignition-disks.service. May 13 00:50:18.788441 ignition[735]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:50:18.798036 systemd[1]: Reached target initrd-root-device.target. May 13 00:50:18.789200 ignition[735]: disks: disks passed May 13 00:50:18.799934 systemd[1]: Reached target local-fs-pre.target. May 13 00:50:18.789227 ignition[735]: Ignition finished successfully May 13 00:50:18.801966 systemd[1]: Reached target local-fs.target. May 13 00:50:18.803454 systemd[1]: Reached target sysinit.target. May 13 00:50:18.804910 systemd[1]: Reached target basic.target. May 13 00:50:18.816996 systemd[1]: Starting dracut-initqueue.service... May 13 00:50:18.825870 systemd[1]: Finished dracut-initqueue.service. May 13 00:50:18.827000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:18.827493 systemd[1]: Reached target remote-fs-pre.target. May 13 00:50:18.829104 systemd[1]: Reached target remote-cryptsetup.target. May 13 00:50:18.830784 systemd[1]: Reached target remote-fs.target. May 13 00:50:18.832818 systemd[1]: Starting dracut-pre-mount.service... May 13 00:50:18.839918 systemd[1]: Finished dracut-pre-mount.service. May 13 00:50:18.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:18.842062 systemd[1]: Starting systemd-fsck-root.service... May 13 00:50:18.851575 systemd-fsck[756]: ROOT: clean, 619/553520 files, 56023/553472 blocks May 13 00:50:18.856451 systemd[1]: Finished systemd-fsck-root.service. May 13 00:50:18.858000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:18.859352 systemd[1]: Mounting sysroot.mount... May 13 00:50:18.866044 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 13 00:50:18.866011 systemd[1]: Mounted sysroot.mount. May 13 00:50:18.866783 systemd[1]: Reached target initrd-root-fs.target. May 13 00:50:18.869043 systemd[1]: Mounting sysroot-usr.mount... May 13 00:50:18.869949 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 13 00:50:18.869979 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 13 00:50:18.869995 systemd[1]: Reached target ignition-diskful.target. May 13 00:50:18.871871 systemd[1]: Mounted sysroot-usr.mount. May 13 00:50:18.873933 systemd[1]: Starting initrd-setup-root.service... May 13 00:50:18.878396 initrd-setup-root[766]: cut: /sysroot/etc/passwd: No such file or directory May 13 00:50:18.881253 initrd-setup-root[774]: cut: /sysroot/etc/group: No such file or directory May 13 00:50:18.884910 initrd-setup-root[782]: cut: /sysroot/etc/shadow: No such file or directory May 13 00:50:18.888617 initrd-setup-root[790]: cut: /sysroot/etc/gshadow: No such file or directory May 13 00:50:18.913231 systemd[1]: Finished initrd-setup-root.service. May 13 00:50:18.914000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:18.915408 systemd[1]: Starting ignition-mount.service... May 13 00:50:18.917348 systemd[1]: Starting sysroot-boot.service... May 13 00:50:18.920026 bash[807]: umount: /sysroot/usr/share/oem: not mounted. May 13 00:50:18.928349 ignition[808]: INFO : Ignition 2.14.0 May 13 00:50:18.928349 ignition[808]: INFO : Stage: mount May 13 00:50:18.929906 ignition[808]: INFO : no configs at "/usr/lib/ignition/base.d" May 13 00:50:18.929906 ignition[808]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:50:18.932616 ignition[808]: INFO : mount: mount passed May 13 00:50:18.933373 ignition[808]: INFO : Ignition finished successfully May 13 00:50:18.934859 systemd[1]: Finished ignition-mount.service. May 13 00:50:18.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:18.937069 systemd[1]: Finished sysroot-boot.service. May 13 00:50:18.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:19.617525 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 13 00:50:19.624428 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (817) May 13 00:50:19.624453 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 13 00:50:19.624463 kernel: BTRFS info (device vda6): using free space tree May 13 00:50:19.625222 kernel: BTRFS info (device vda6): has skinny extents May 13 00:50:19.628723 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 13 00:50:19.630177 systemd[1]: Starting ignition-files.service... May 13 00:50:19.642557 ignition[837]: INFO : Ignition 2.14.0 May 13 00:50:19.642557 ignition[837]: INFO : Stage: files May 13 00:50:19.644252 ignition[837]: INFO : no configs at "/usr/lib/ignition/base.d" May 13 00:50:19.644252 ignition[837]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:50:19.644252 ignition[837]: DEBUG : files: compiled without relabeling support, skipping May 13 00:50:19.647873 ignition[837]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 13 00:50:19.647873 ignition[837]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 13 00:50:19.647873 ignition[837]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 13 00:50:19.647873 ignition[837]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 13 00:50:19.647873 ignition[837]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 13 00:50:19.647296 unknown[837]: wrote ssh authorized keys file for user: core May 13 00:50:19.655883 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/flatcar-cgroupv1" May 13 00:50:19.655883 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/flatcar-cgroupv1" May 13 00:50:19.655883 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 13 00:50:19.655883 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 13 00:50:19.655883 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/etc/flatcar/update.conf" May 13 00:50:19.655883 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 13 00:50:19.655883 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 13 00:50:19.655883 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 13 00:50:19.655883 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 13 00:50:19.655883 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-x86-64.raw: attempt #1 May 13 00:50:20.035414 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK May 13 00:50:20.397991 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 13 00:50:20.397991 ignition[837]: INFO : files: op(8): [started] processing unit "containerd.service" May 13 00:50:20.401393 ignition[837]: INFO : files: op(8): op(9): [started] writing systemd drop-in "10-use-cgroupfs.conf" at "/sysroot/etc/systemd/system/containerd.service.d/10-use-cgroupfs.conf" May 13 00:50:20.403577 ignition[837]: INFO : files: op(8): op(9): [finished] writing systemd drop-in "10-use-cgroupfs.conf" at "/sysroot/etc/systemd/system/containerd.service.d/10-use-cgroupfs.conf" May 13 00:50:20.403577 ignition[837]: INFO : files: op(8): [finished] processing unit "containerd.service" May 13 00:50:20.403577 ignition[837]: INFO : files: op(a): [started] processing unit "coreos-metadata.service" May 13 00:50:20.408098 ignition[837]: INFO : files: op(a): op(b): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 13 00:50:20.409954 ignition[837]: INFO : files: op(a): op(b): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 13 00:50:20.409954 ignition[837]: INFO : files: op(a): [finished] processing unit "coreos-metadata.service" May 13 00:50:20.409954 ignition[837]: INFO : files: op(c): [started] setting preset to disabled for "coreos-metadata.service" May 13 00:50:20.409954 ignition[837]: INFO : files: op(c): op(d): [started] removing enablement symlink(s) for "coreos-metadata.service" May 13 00:50:20.432314 ignition[837]: INFO : files: op(c): op(d): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 13 00:50:20.433894 ignition[837]: INFO : files: op(c): [finished] setting preset to disabled for "coreos-metadata.service" May 13 00:50:20.435386 ignition[837]: INFO : files: createResultFile: createFiles: op(e): [started] writing file "/sysroot/etc/.ignition-result.json" May 13 00:50:20.437097 ignition[837]: INFO : files: createResultFile: createFiles: op(e): [finished] writing file "/sysroot/etc/.ignition-result.json" May 13 00:50:20.438740 ignition[837]: INFO : files: files passed May 13 00:50:20.439483 ignition[837]: INFO : Ignition finished successfully May 13 00:50:20.441244 systemd[1]: Finished ignition-files.service. May 13 00:50:20.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:20.443544 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 13 00:50:20.444322 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 13 00:50:20.445533 systemd[1]: Starting ignition-quench.service... May 13 00:50:20.448775 initrd-setup-root-after-ignition[862]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory May 13 00:50:20.450203 initrd-setup-root-after-ignition[864]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 13 00:50:20.450000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:20.449858 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 13 00:50:20.450664 systemd[1]: Reached target ignition-complete.target. May 13 00:50:20.451463 systemd[1]: Starting initrd-parse-etc.service... May 13 00:50:20.459807 systemd[1]: ignition-quench.service: Deactivated successfully. May 13 00:50:20.459898 systemd[1]: Finished ignition-quench.service. May 13 00:50:20.460000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:20.460000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:20.463598 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 13 00:50:20.463671 systemd[1]: Finished initrd-parse-etc.service. May 13 00:50:20.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:20.465000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:20.465391 systemd[1]: Reached target initrd-fs.target. May 13 00:50:20.465858 systemd[1]: Reached target initrd.target. May 13 00:50:20.466397 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 13 00:50:20.466983 systemd[1]: Starting dracut-pre-pivot.service... May 13 00:50:20.476594 systemd[1]: Finished dracut-pre-pivot.service. May 13 00:50:20.477000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:20.477819 systemd[1]: Starting initrd-cleanup.service... May 13 00:50:20.485998 systemd[1]: Stopped target nss-lookup.target. May 13 00:50:20.486520 systemd[1]: Stopped target remote-cryptsetup.target. May 13 00:50:20.488006 systemd[1]: Stopped target timers.target. May 13 00:50:20.489570 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 13 00:50:20.490000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:20.489651 systemd[1]: Stopped dracut-pre-pivot.service. May 13 00:50:20.490993 systemd[1]: Stopped target initrd.target. May 13 00:50:20.492396 systemd[1]: Stopped target basic.target. May 13 00:50:20.493963 systemd[1]: Stopped target ignition-complete.target. May 13 00:50:20.495300 systemd[1]: Stopped target ignition-diskful.target. May 13 00:50:20.496754 systemd[1]: Stopped target initrd-root-device.target. May 13 00:50:20.498314 systemd[1]: Stopped target remote-fs.target. May 13 00:50:20.499878 systemd[1]: Stopped target remote-fs-pre.target. May 13 00:50:20.501393 systemd[1]: Stopped target sysinit.target. May 13 00:50:20.502688 systemd[1]: Stopped target local-fs.target. May 13 00:50:20.504286 systemd[1]: Stopped target local-fs-pre.target. May 13 00:50:20.505663 systemd[1]: Stopped target swap.target. May 13 00:50:20.508000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:20.507075 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 13 00:50:20.507152 systemd[1]: Stopped dracut-pre-mount.service. May 13 00:50:20.511000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:20.508540 systemd[1]: Stopped target cryptsetup.target. May 13 00:50:20.512000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:20.509839 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 13 00:50:20.509914 systemd[1]: Stopped dracut-initqueue.service. May 13 00:50:20.511527 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 13 00:50:20.511611 systemd[1]: Stopped ignition-fetch-offline.service. May 13 00:50:20.512988 systemd[1]: Stopped target paths.target. May 13 00:50:20.514411 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 13 00:50:20.518057 systemd[1]: Stopped systemd-ask-password-console.path. May 13 00:50:20.518526 systemd[1]: Stopped target slices.target. May 13 00:50:20.519999 systemd[1]: Stopped target sockets.target. May 13 00:50:20.524000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:20.521669 systemd[1]: iscsid.socket: Deactivated successfully. May 13 00:50:20.525000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:20.521728 systemd[1]: Closed iscsid.socket. May 13 00:50:20.523034 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 13 00:50:20.523113 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 13 00:50:20.528000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:20.532787 ignition[878]: INFO : Ignition 2.14.0 May 13 00:50:20.532787 ignition[878]: INFO : Stage: umount May 13 00:50:20.532787 ignition[878]: INFO : no configs at "/usr/lib/ignition/base.d" May 13 00:50:20.532787 ignition[878]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 13 00:50:20.534000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:20.538000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:20.524485 systemd[1]: ignition-files.service: Deactivated successfully. May 13 00:50:20.542496 ignition[878]: INFO : umount: umount passed May 13 00:50:20.542496 ignition[878]: INFO : Ignition finished successfully May 13 00:50:20.542000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:20.524558 systemd[1]: Stopped ignition-files.service. May 13 00:50:20.526659 systemd[1]: Stopping ignition-mount.service... May 13 00:50:20.527624 systemd[1]: Stopping iscsiuio.service... May 13 00:50:20.528650 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 13 00:50:20.528767 systemd[1]: Stopped kmod-static-nodes.service. May 13 00:50:20.529703 systemd[1]: Stopping sysroot-boot.service... May 13 00:50:20.532886 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 13 00:50:20.533038 systemd[1]: Stopped systemd-udev-trigger.service. May 13 00:50:20.535573 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 13 00:50:20.535675 systemd[1]: Stopped dracut-pre-trigger.service. May 13 00:50:20.540401 systemd[1]: iscsiuio.service: Deactivated successfully. May 13 00:50:20.540479 systemd[1]: Stopped iscsiuio.service. May 13 00:50:20.554323 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 13 00:50:20.555674 systemd[1]: ignition-mount.service: Deactivated successfully. May 13 00:50:20.556636 systemd[1]: Stopped ignition-mount.service. May 13 00:50:20.558000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:20.558465 systemd[1]: Stopped target network.target. May 13 00:50:20.560041 systemd[1]: iscsiuio.socket: Deactivated successfully. May 13 00:50:20.560077 systemd[1]: Closed iscsiuio.socket. May 13 00:50:20.562129 systemd[1]: ignition-disks.service: Deactivated successfully. May 13 00:50:20.562165 systemd[1]: Stopped ignition-disks.service. May 13 00:50:20.564000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:20.564502 systemd[1]: ignition-kargs.service: Deactivated successfully. May 13 00:50:20.564531 systemd[1]: Stopped ignition-kargs.service. May 13 00:50:20.566000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:20.566857 systemd[1]: ignition-setup.service: Deactivated successfully. May 13 00:50:20.566887 systemd[1]: Stopped ignition-setup.service. May 13 00:50:20.569000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:20.569391 systemd[1]: Stopping systemd-networkd.service... May 13 00:50:20.571090 systemd[1]: Stopping systemd-resolved.service... May 13 00:50:20.572793 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 13 00:50:20.573048 systemd-networkd[722]: eth0: DHCPv6 lease lost May 13 00:50:20.575000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:20.575000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:20.573771 systemd[1]: Finished initrd-cleanup.service. May 13 00:50:20.576259 systemd[1]: systemd-networkd.service: Deactivated successfully. May 13 00:50:20.577226 systemd[1]: Stopped systemd-networkd.service. May 13 00:50:20.578000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:20.579912 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 13 00:50:20.579940 systemd[1]: Closed systemd-networkd.socket. May 13 00:50:20.582928 systemd[1]: Stopping network-cleanup.service... May 13 00:50:20.584586 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 13 00:50:20.585000 audit: BPF prog-id=9 op=UNLOAD May 13 00:50:20.584631 systemd[1]: Stopped parse-ip-for-networkd.service. May 13 00:50:20.587000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:20.587399 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 13 00:50:20.587431 systemd[1]: Stopped systemd-sysctl.service. May 13 00:50:20.589000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:20.589780 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 13 00:50:20.589815 systemd[1]: Stopped systemd-modules-load.service. May 13 00:50:20.591000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:20.592579 systemd[1]: Stopping systemd-udevd.service... May 13 00:50:20.594812 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 13 00:50:20.596388 systemd[1]: systemd-resolved.service: Deactivated successfully. May 13 00:50:20.597391 systemd[1]: Stopped systemd-resolved.service. May 13 00:50:20.598000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:20.599633 systemd[1]: systemd-udevd.service: Deactivated successfully. May 13 00:50:20.600614 systemd[1]: Stopped systemd-udevd.service. May 13 00:50:20.602000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:20.602524 systemd[1]: sysroot-boot.service: Deactivated successfully. May 13 00:50:20.603441 systemd[1]: Stopped sysroot-boot.service. May 13 00:50:20.604000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:20.605000 audit: BPF prog-id=6 op=UNLOAD May 13 00:50:20.605683 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 13 00:50:20.605724 systemd[1]: Closed systemd-udevd-control.socket. May 13 00:50:20.608291 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 13 00:50:20.608320 systemd[1]: Closed systemd-udevd-kernel.socket. May 13 00:50:20.610798 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 13 00:50:20.610832 systemd[1]: Stopped dracut-pre-udev.service. May 13 00:50:20.613000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:20.613283 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 13 00:50:20.613312 systemd[1]: Stopped dracut-cmdline.service. May 13 00:50:20.615000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:20.615645 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 13 00:50:20.615677 systemd[1]: Stopped dracut-cmdline-ask.service. May 13 00:50:20.618000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:20.618190 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 13 00:50:20.619000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:20.618221 systemd[1]: Stopped initrd-setup-root.service. May 13 00:50:20.621265 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 13 00:50:20.622964 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 13 00:50:20.623006 systemd[1]: Stopped systemd-vconsole-setup.service. May 13 00:50:20.624000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:20.625876 systemd[1]: network-cleanup.service: Deactivated successfully. May 13 00:50:20.626825 systemd[1]: Stopped network-cleanup.service. May 13 00:50:20.628000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:20.628504 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 13 00:50:20.629566 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 13 00:50:20.631000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:20.631000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:20.631433 systemd[1]: Reached target initrd-switch-root.target. May 13 00:50:20.633746 systemd[1]: Starting initrd-switch-root.service... May 13 00:50:20.639061 systemd[1]: Switching root. May 13 00:50:20.641000 audit: BPF prog-id=8 op=UNLOAD May 13 00:50:20.641000 audit: BPF prog-id=7 op=UNLOAD May 13 00:50:20.643000 audit: BPF prog-id=5 op=UNLOAD May 13 00:50:20.643000 audit: BPF prog-id=4 op=UNLOAD May 13 00:50:20.643000 audit: BPF prog-id=3 op=UNLOAD May 13 00:50:20.658724 iscsid[734]: iscsid shutting down. May 13 00:50:20.659417 systemd-journald[197]: Received SIGTERM from PID 1 (systemd). May 13 00:50:20.659460 systemd-journald[197]: Journal stopped May 13 00:50:23.153179 kernel: SELinux: Class mctp_socket not defined in policy. May 13 00:50:23.153230 kernel: SELinux: Class anon_inode not defined in policy. May 13 00:50:23.153241 kernel: SELinux: the above unknown classes and permissions will be allowed May 13 00:50:23.153250 kernel: SELinux: policy capability network_peer_controls=1 May 13 00:50:23.153260 kernel: SELinux: policy capability open_perms=1 May 13 00:50:23.153270 kernel: SELinux: policy capability extended_socket_class=1 May 13 00:50:23.153282 kernel: SELinux: policy capability always_check_network=0 May 13 00:50:23.153294 kernel: SELinux: policy capability cgroup_seclabel=1 May 13 00:50:23.153303 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 13 00:50:23.153314 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 13 00:50:23.153325 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 13 00:50:23.153338 systemd[1]: Successfully loaded SELinux policy in 42.817ms. May 13 00:50:23.153355 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.490ms. May 13 00:50:23.153366 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 13 00:50:23.153376 systemd[1]: Detected virtualization kvm. May 13 00:50:23.153386 systemd[1]: Detected architecture x86-64. May 13 00:50:23.153396 systemd[1]: Detected first boot. May 13 00:50:23.153406 systemd[1]: Initializing machine ID from VM UUID. May 13 00:50:23.153419 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 13 00:50:23.153431 systemd[1]: Populated /etc with preset unit settings. May 13 00:50:23.153441 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 00:50:23.153454 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 00:50:23.153465 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 00:50:23.153476 systemd[1]: Queued start job for default target multi-user.target. May 13 00:50:23.153493 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 13 00:50:23.153504 systemd[1]: Created slice system-addon\x2dconfig.slice. May 13 00:50:23.153515 systemd[1]: Created slice system-addon\x2drun.slice. May 13 00:50:23.153524 systemd[1]: Created slice system-getty.slice. May 13 00:50:23.153534 systemd[1]: Created slice system-modprobe.slice. May 13 00:50:23.153544 systemd[1]: Created slice system-serial\x2dgetty.slice. May 13 00:50:23.153554 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 13 00:50:23.153564 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 13 00:50:23.153573 systemd[1]: Created slice user.slice. May 13 00:50:23.153584 systemd[1]: Started systemd-ask-password-console.path. May 13 00:50:23.153595 systemd[1]: Started systemd-ask-password-wall.path. May 13 00:50:23.153605 systemd[1]: Set up automount boot.automount. May 13 00:50:23.153614 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 13 00:50:23.153625 systemd[1]: Reached target integritysetup.target. May 13 00:50:23.153635 systemd[1]: Reached target remote-cryptsetup.target. May 13 00:50:23.153647 systemd[1]: Reached target remote-fs.target. May 13 00:50:23.153658 systemd[1]: Reached target slices.target. May 13 00:50:23.153668 systemd[1]: Reached target swap.target. May 13 00:50:23.153678 systemd[1]: Reached target torcx.target. May 13 00:50:23.153688 systemd[1]: Reached target veritysetup.target. May 13 00:50:23.153697 systemd[1]: Listening on systemd-coredump.socket. May 13 00:50:23.153707 systemd[1]: Listening on systemd-initctl.socket. May 13 00:50:23.153717 kernel: kauditd_printk_skb: 80 callbacks suppressed May 13 00:50:23.153727 kernel: audit: type=1400 audit(1747097423.066:84): avc: denied { audit_read } for pid=1 comm="systemd" capability=37 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 13 00:50:23.153737 systemd[1]: Listening on systemd-journald-audit.socket. May 13 00:50:23.153748 kernel: audit: type=1335 audit(1747097423.066:85): pid=1 uid=0 auid=4294967295 tty=(none) ses=4294967295 subj=system_u:system_r:kernel_t:s0 comm="systemd" exe="/usr/lib/systemd/systemd" nl-mcgrp=1 op=connect res=1 May 13 00:50:23.153757 systemd[1]: Listening on systemd-journald-dev-log.socket. May 13 00:50:23.153767 systemd[1]: Listening on systemd-journald.socket. May 13 00:50:23.153777 systemd[1]: Listening on systemd-networkd.socket. May 13 00:50:23.153787 systemd[1]: Listening on systemd-udevd-control.socket. May 13 00:50:23.153797 systemd[1]: Listening on systemd-udevd-kernel.socket. May 13 00:50:23.153807 systemd[1]: Listening on systemd-userdbd.socket. May 13 00:50:23.153817 systemd[1]: Mounting dev-hugepages.mount... May 13 00:50:23.153829 systemd[1]: Mounting dev-mqueue.mount... May 13 00:50:23.153839 systemd[1]: Mounting media.mount... May 13 00:50:23.153849 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:50:23.153860 systemd[1]: Mounting sys-kernel-debug.mount... May 13 00:50:23.153870 systemd[1]: Mounting sys-kernel-tracing.mount... May 13 00:50:23.153880 systemd[1]: Mounting tmp.mount... May 13 00:50:23.153890 systemd[1]: Starting flatcar-tmpfiles.service... May 13 00:50:23.153900 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 00:50:23.153909 systemd[1]: Starting kmod-static-nodes.service... May 13 00:50:23.153920 systemd[1]: Starting modprobe@configfs.service... May 13 00:50:23.153930 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:50:23.153940 systemd[1]: Starting modprobe@drm.service... May 13 00:50:23.153949 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:50:23.153959 systemd[1]: Starting modprobe@fuse.service... May 13 00:50:23.153969 systemd[1]: Starting modprobe@loop.service... May 13 00:50:23.153980 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 13 00:50:23.153990 systemd[1]: systemd-journald.service: unit configures an IP firewall, but the local system does not support BPF/cgroup firewalling. May 13 00:50:23.154002 systemd[1]: (This warning is only shown for the first unit using IP firewalling.) May 13 00:50:23.154012 systemd[1]: Starting systemd-journald.service... May 13 00:50:23.154032 kernel: loop: module loaded May 13 00:50:23.154042 systemd[1]: Starting systemd-modules-load.service... May 13 00:50:23.154051 systemd[1]: Starting systemd-network-generator.service... May 13 00:50:23.154063 kernel: fuse: init (API version 7.34) May 13 00:50:23.154073 systemd[1]: Starting systemd-remount-fs.service... May 13 00:50:23.154083 systemd[1]: Starting systemd-udev-trigger.service... May 13 00:50:23.154093 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:50:23.154103 systemd[1]: Mounted dev-hugepages.mount. May 13 00:50:23.154114 systemd[1]: Mounted dev-mqueue.mount. May 13 00:50:23.154124 systemd[1]: Mounted media.mount. May 13 00:50:23.154134 systemd[1]: Mounted sys-kernel-debug.mount. May 13 00:50:23.154144 systemd[1]: Mounted sys-kernel-tracing.mount. May 13 00:50:23.154154 kernel: audit: type=1305 audit(1747097423.152:86): op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 13 00:50:23.154166 systemd-journald[1020]: Journal started May 13 00:50:23.154202 systemd-journald[1020]: Runtime Journal (/run/log/journal/6c52526acf4a424392682e3221ade1c4) is 6.0M, max 48.4M, 42.4M free. May 13 00:50:23.066000 audit[1]: AVC avc: denied { audit_read } for pid=1 comm="systemd" capability=37 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 13 00:50:23.066000 audit[1]: EVENT_LISTENER pid=1 uid=0 auid=4294967295 tty=(none) ses=4294967295 subj=system_u:system_r:kernel_t:s0 comm="systemd" exe="/usr/lib/systemd/systemd" nl-mcgrp=1 op=connect res=1 May 13 00:50:23.152000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 13 00:50:23.152000 audit[1020]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7ffe0ce5b070 a2=4000 a3=7ffe0ce5b10c items=0 ppid=1 pid=1020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:23.159453 kernel: audit: type=1300 audit(1747097423.152:86): arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7ffe0ce5b070 a2=4000 a3=7ffe0ce5b10c items=0 ppid=1 pid=1020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:23.160953 kernel: audit: type=1327 audit(1747097423.152:86): proctitle="/usr/lib/systemd/systemd-journald" May 13 00:50:23.152000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 13 00:50:23.163100 systemd[1]: Started systemd-journald.service. May 13 00:50:23.163000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:23.163997 systemd[1]: Mounted tmp.mount. May 13 00:50:23.167040 kernel: audit: type=1130 audit(1747097423.163:87): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:23.167524 systemd[1]: Finished kmod-static-nodes.service. May 13 00:50:23.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:23.168548 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 13 00:50:23.168768 systemd[1]: Finished modprobe@configfs.service. May 13 00:50:23.172276 kernel: audit: type=1130 audit(1747097423.168:88): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:23.172308 kernel: audit: type=1130 audit(1747097423.172:89): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:23.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:23.172710 systemd[1]: Finished flatcar-tmpfiles.service. May 13 00:50:23.172000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:23.178377 kernel: audit: type=1131 audit(1747097423.172:90): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:23.179000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:23.179397 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:50:23.179585 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:50:23.183111 kernel: audit: type=1130 audit(1747097423.179:91): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:23.183000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:23.183000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:23.183296 systemd[1]: modprobe@drm.service: Deactivated successfully. May 13 00:50:23.183498 systemd[1]: Finished modprobe@drm.service. May 13 00:50:23.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:23.184000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:23.184498 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:50:23.184703 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:50:23.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:23.185000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:23.185738 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 13 00:50:23.185864 systemd[1]: Finished modprobe@fuse.service. May 13 00:50:23.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:23.186000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:23.186824 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:50:23.186944 systemd[1]: Finished modprobe@loop.service. May 13 00:50:23.187968 systemd[1]: Finished systemd-modules-load.service. May 13 00:50:23.187000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:23.187000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:23.188000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:23.189250 systemd[1]: Finished systemd-network-generator.service. May 13 00:50:23.190000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:23.191054 systemd[1]: Finished systemd-remount-fs.service. May 13 00:50:23.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:23.192519 systemd[1]: Reached target network-pre.target. May 13 00:50:23.194568 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 13 00:50:23.196223 systemd[1]: Mounting sys-kernel-config.mount... May 13 00:50:23.196958 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 13 00:50:23.198285 systemd[1]: Starting systemd-hwdb-update.service... May 13 00:50:23.200240 systemd[1]: Starting systemd-journal-flush.service... May 13 00:50:23.201127 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 00:50:23.202015 systemd[1]: Starting systemd-random-seed.service... May 13 00:50:23.202867 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 00:50:23.203919 systemd[1]: Starting systemd-sysctl.service... May 13 00:50:23.205681 systemd[1]: Starting systemd-sysusers.service... May 13 00:50:23.206718 systemd-journald[1020]: Time spent on flushing to /var/log/journal/6c52526acf4a424392682e3221ade1c4 is 13.374ms for 1082 entries. May 13 00:50:23.206718 systemd-journald[1020]: System Journal (/var/log/journal/6c52526acf4a424392682e3221ade1c4) is 8.0M, max 195.6M, 187.6M free. May 13 00:50:23.230318 systemd-journald[1020]: Received client request to flush runtime journal. May 13 00:50:23.210000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:23.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:23.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:23.209426 systemd[1]: Finished systemd-udev-trigger.service. May 13 00:50:23.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:23.232000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:23.210732 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 13 00:50:23.238214 udevadm[1063]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. May 13 00:50:23.211872 systemd[1]: Mounted sys-kernel-config.mount. May 13 00:50:23.214075 systemd[1]: Starting systemd-udev-settle.service... May 13 00:50:23.215410 systemd[1]: Finished systemd-random-seed.service. May 13 00:50:23.216429 systemd[1]: Reached target first-boot-complete.target. May 13 00:50:23.226078 systemd[1]: Finished systemd-sysusers.service. May 13 00:50:23.227823 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 13 00:50:23.230415 systemd[1]: Finished systemd-sysctl.service. May 13 00:50:23.231696 systemd[1]: Finished systemd-journal-flush.service. May 13 00:50:23.244770 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 13 00:50:23.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:23.614282 systemd[1]: Finished systemd-hwdb-update.service. May 13 00:50:23.615000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:23.616287 systemd[1]: Starting systemd-udevd.service... May 13 00:50:23.632477 systemd-udevd[1073]: Using default interface naming scheme 'v252'. May 13 00:50:23.644260 systemd[1]: Started systemd-udevd.service. May 13 00:50:23.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:23.646842 systemd[1]: Starting systemd-networkd.service... May 13 00:50:23.654165 systemd[1]: Starting systemd-userdbd.service... May 13 00:50:23.685425 systemd[1]: Started systemd-userdbd.service. May 13 00:50:23.686000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:23.687585 systemd[1]: Found device dev-ttyS0.device. May 13 00:50:23.708049 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 13 00:50:23.713431 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 13 00:50:23.716038 kernel: ACPI: button: Power Button [PWRF] May 13 00:50:23.734529 systemd-networkd[1084]: lo: Link UP May 13 00:50:23.734537 systemd-networkd[1084]: lo: Gained carrier May 13 00:50:23.734880 systemd-networkd[1084]: Enumeration completed May 13 00:50:23.734986 systemd[1]: Started systemd-networkd.service. May 13 00:50:23.735902 systemd-networkd[1084]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 13 00:50:23.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:23.736890 systemd-networkd[1084]: eth0: Link UP May 13 00:50:23.736896 systemd-networkd[1084]: eth0: Gained carrier May 13 00:50:23.730000 audit[1081]: AVC avc: denied { confidentiality } for pid=1081 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 13 00:50:23.730000 audit[1081]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55c27229b760 a1=338ac a2=7fda93de8bc5 a3=5 items=110 ppid=1073 pid=1081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:23.730000 audit: CWD cwd="/" May 13 00:50:23.730000 audit: PATH item=0 name=(null) inode=51 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=1 name=(null) inode=15651 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=2 name=(null) inode=15651 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=3 name=(null) inode=15652 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=4 name=(null) inode=15651 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=5 name=(null) inode=15653 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=6 name=(null) inode=15651 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=7 name=(null) inode=15654 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=8 name=(null) inode=15654 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=9 name=(null) inode=15655 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=10 name=(null) inode=15654 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=11 name=(null) inode=15656 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=12 name=(null) inode=15654 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=13 name=(null) inode=15657 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=14 name=(null) inode=15654 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=15 name=(null) inode=15658 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=16 name=(null) inode=15654 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=17 name=(null) inode=15659 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=18 name=(null) inode=15651 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=19 name=(null) inode=15660 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=20 name=(null) inode=15660 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=21 name=(null) inode=15661 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=22 name=(null) inode=15660 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=23 name=(null) inode=15662 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=24 name=(null) inode=15660 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=25 name=(null) inode=15663 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=26 name=(null) inode=15660 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=27 name=(null) inode=15664 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=28 name=(null) inode=15660 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=29 name=(null) inode=15665 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=30 name=(null) inode=15651 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=31 name=(null) inode=15666 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=32 name=(null) inode=15666 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=33 name=(null) inode=15667 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=34 name=(null) inode=15666 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=35 name=(null) inode=15668 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=36 name=(null) inode=15666 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=37 name=(null) inode=15669 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=38 name=(null) inode=15666 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=39 name=(null) inode=15670 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=40 name=(null) inode=15666 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=41 name=(null) inode=15671 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=42 name=(null) inode=15651 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=43 name=(null) inode=15672 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=44 name=(null) inode=15672 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=45 name=(null) inode=15673 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=46 name=(null) inode=15672 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=47 name=(null) inode=15674 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=48 name=(null) inode=15672 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=49 name=(null) inode=15675 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=50 name=(null) inode=15672 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=51 name=(null) inode=15676 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=52 name=(null) inode=15672 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=53 name=(null) inode=15677 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=54 name=(null) inode=51 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=55 name=(null) inode=15678 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=56 name=(null) inode=15678 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=57 name=(null) inode=15679 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=58 name=(null) inode=15678 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=59 name=(null) inode=15680 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=60 name=(null) inode=15678 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=61 name=(null) inode=15681 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=62 name=(null) inode=15681 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=63 name=(null) inode=15682 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=64 name=(null) inode=15681 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=65 name=(null) inode=15683 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=66 name=(null) inode=15681 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=67 name=(null) inode=15684 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=68 name=(null) inode=15681 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=69 name=(null) inode=15685 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=70 name=(null) inode=15681 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=71 name=(null) inode=15686 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=72 name=(null) inode=15678 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=73 name=(null) inode=15687 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=74 name=(null) inode=15687 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=75 name=(null) inode=15688 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=76 name=(null) inode=15687 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=77 name=(null) inode=15689 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=78 name=(null) inode=15687 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=79 name=(null) inode=15690 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=80 name=(null) inode=15687 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=81 name=(null) inode=15691 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=82 name=(null) inode=15687 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=83 name=(null) inode=15692 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=84 name=(null) inode=15678 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=85 name=(null) inode=15693 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=86 name=(null) inode=15693 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=87 name=(null) inode=15694 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=88 name=(null) inode=15693 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=89 name=(null) inode=15695 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=90 name=(null) inode=15693 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=91 name=(null) inode=15696 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=92 name=(null) inode=15693 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=93 name=(null) inode=15697 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=94 name=(null) inode=15693 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=95 name=(null) inode=15698 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=96 name=(null) inode=15678 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=97 name=(null) inode=15699 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=98 name=(null) inode=15699 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=99 name=(null) inode=15700 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=100 name=(null) inode=15699 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=101 name=(null) inode=15701 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=102 name=(null) inode=15699 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=103 name=(null) inode=15702 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=104 name=(null) inode=15699 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=105 name=(null) inode=15703 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=106 name=(null) inode=15699 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=107 name=(null) inode=15704 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PATH item=109 name=(null) inode=15705 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:23.730000 audit: PROCTITLE proctitle="(udev-worker)" May 13 00:50:23.750130 systemd-networkd[1084]: eth0: DHCPv4 address 10.0.0.142/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 13 00:50:23.751717 kernel: i801_smbus 0000:00:1f.3: Enabling SMBus device May 13 00:50:23.768477 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt May 13 00:50:23.768588 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) May 13 00:50:23.768691 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD May 13 00:50:23.778995 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 May 13 00:50:23.782042 kernel: mousedev: PS/2 mouse device common for all mice May 13 00:50:23.813162 kernel: kvm: Nested Virtualization enabled May 13 00:50:23.813196 kernel: SVM: kvm: Nested Paging enabled May 13 00:50:23.813219 kernel: SVM: Virtual VMLOAD VMSAVE supported May 13 00:50:23.814363 kernel: SVM: Virtual GIF supported May 13 00:50:23.830047 kernel: EDAC MC: Ver: 3.0.0 May 13 00:50:23.860430 systemd[1]: Finished systemd-udev-settle.service. May 13 00:50:23.861000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:23.862558 systemd[1]: Starting lvm2-activation-early.service... May 13 00:50:23.869748 lvm[1110]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 13 00:50:23.901777 systemd[1]: Finished lvm2-activation-early.service. May 13 00:50:23.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:23.902814 systemd[1]: Reached target cryptsetup.target. May 13 00:50:23.904720 systemd[1]: Starting lvm2-activation.service... May 13 00:50:23.908147 lvm[1112]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 13 00:50:23.936247 systemd[1]: Finished lvm2-activation.service. May 13 00:50:23.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:23.937185 systemd[1]: Reached target local-fs-pre.target. May 13 00:50:23.938035 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 13 00:50:23.938062 systemd[1]: Reached target local-fs.target. May 13 00:50:23.938850 systemd[1]: Reached target machines.target. May 13 00:50:23.940645 systemd[1]: Starting ldconfig.service... May 13 00:50:23.941546 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:50:23.941589 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:50:23.942532 systemd[1]: Starting systemd-boot-update.service... May 13 00:50:23.944291 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 13 00:50:23.947459 systemd[1]: Starting systemd-machine-id-commit.service... May 13 00:50:23.949423 systemd[1]: Starting systemd-sysext.service... May 13 00:50:23.950518 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1115 (bootctl) May 13 00:50:23.951347 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 13 00:50:23.958000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:23.957083 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 13 00:50:23.962400 systemd[1]: Unmounting usr-share-oem.mount... May 13 00:50:23.965941 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 13 00:50:23.966146 systemd[1]: Unmounted usr-share-oem.mount. May 13 00:50:23.977055 kernel: loop0: detected capacity change from 0 to 210664 May 13 00:50:23.984905 systemd-fsck[1123]: fsck.fat 4.2 (2021-01-31) May 13 00:50:23.984905 systemd-fsck[1123]: /dev/vda1: 791 files, 120712/258078 clusters May 13 00:50:23.986242 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 13 00:50:23.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:23.988931 systemd[1]: Mounting boot.mount... May 13 00:50:24.001929 systemd[1]: Mounted boot.mount. May 13 00:50:24.237045 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 13 00:50:24.240133 systemd[1]: Finished systemd-boot-update.service. May 13 00:50:24.241000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:24.244661 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 13 00:50:24.245210 systemd[1]: Finished systemd-machine-id-commit.service. May 13 00:50:24.246000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:24.255054 kernel: loop1: detected capacity change from 0 to 210664 May 13 00:50:24.257966 (sd-sysext)[1136]: Using extensions 'kubernetes'. May 13 00:50:24.258256 (sd-sysext)[1136]: Merged extensions into '/usr'. May 13 00:50:24.271578 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:50:24.272905 systemd[1]: Mounting usr-share-oem.mount... May 13 00:50:24.274107 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 00:50:24.275288 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:50:24.277135 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:50:24.278781 systemd[1]: Starting modprobe@loop.service... May 13 00:50:24.279619 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:50:24.279732 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:50:24.279837 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:50:24.282325 systemd[1]: Mounted usr-share-oem.mount. May 13 00:50:24.283655 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:50:24.283784 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:50:24.284000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:24.284000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:24.285197 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:50:24.285322 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:50:24.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:24.286000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:24.286734 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:50:24.286874 systemd[1]: Finished modprobe@loop.service. May 13 00:50:24.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:24.287000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:24.288048 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 00:50:24.288245 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 00:50:24.289221 systemd[1]: Finished systemd-sysext.service. May 13 00:50:24.289300 ldconfig[1114]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 13 00:50:24.290000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:24.291549 systemd[1]: Starting ensure-sysext.service... May 13 00:50:24.293290 systemd[1]: Starting systemd-tmpfiles-setup.service... May 13 00:50:24.296353 systemd[1]: Finished ldconfig.service. May 13 00:50:24.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:24.298616 systemd[1]: Reloading. May 13 00:50:24.301665 systemd-tmpfiles[1150]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 13 00:50:24.302620 systemd-tmpfiles[1150]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 13 00:50:24.303921 systemd-tmpfiles[1150]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 13 00:50:24.349569 /usr/lib/systemd/system-generators/torcx-generator[1171]: time="2025-05-13T00:50:24Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 00:50:24.349870 /usr/lib/systemd/system-generators/torcx-generator[1171]: time="2025-05-13T00:50:24Z" level=info msg="torcx already run" May 13 00:50:24.410659 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 00:50:24.410674 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 00:50:24.426988 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 00:50:24.480152 systemd[1]: Finished systemd-tmpfiles-setup.service. May 13 00:50:24.481000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:24.483691 systemd[1]: Starting audit-rules.service... May 13 00:50:24.485434 systemd[1]: Starting clean-ca-certificates.service... May 13 00:50:24.487201 systemd[1]: Starting systemd-journal-catalog-update.service... May 13 00:50:24.489481 systemd[1]: Starting systemd-resolved.service... May 13 00:50:24.491353 systemd[1]: Starting systemd-timesyncd.service... May 13 00:50:24.492989 systemd[1]: Starting systemd-update-utmp.service... May 13 00:50:24.494266 systemd[1]: Finished clean-ca-certificates.service. May 13 00:50:24.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:24.498000 audit[1231]: SYSTEM_BOOT pid=1231 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 13 00:50:24.499900 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:50:24.500336 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 00:50:24.501621 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:50:24.505052 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:50:24.506829 systemd[1]: Starting modprobe@loop.service... May 13 00:50:24.510000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:24.512000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:24.512000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:24.507740 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:50:24.507936 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:50:24.508088 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 13 00:50:24.508195 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:50:24.509591 systemd[1]: Finished systemd-journal-catalog-update.service. May 13 00:50:24.511230 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:50:24.511365 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:50:24.512677 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:50:24.512804 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:50:24.514000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:24.514000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:24.514636 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:50:24.515000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 13 00:50:24.515000 audit[1247]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdda9fcb50 a2=420 a3=0 items=0 ppid=1219 pid=1247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:24.515000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 13 00:50:24.515921 augenrules[1247]: No rules May 13 00:50:24.514944 systemd[1]: Finished modprobe@loop.service. May 13 00:50:24.517853 systemd[1]: Finished audit-rules.service. May 13 00:50:24.520554 systemd[1]: Finished systemd-update-utmp.service. May 13 00:50:24.522565 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:50:24.522751 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 00:50:24.523861 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:50:24.525823 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:50:24.527788 systemd[1]: Starting modprobe@loop.service... May 13 00:50:24.528825 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:50:24.528922 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:50:24.530066 systemd[1]: Starting systemd-update-done.service... May 13 00:50:24.531223 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 13 00:50:24.531306 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:50:24.532174 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:50:24.532300 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:50:24.533710 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:50:24.533827 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:50:24.535124 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:50:24.535356 systemd[1]: Finished modprobe@loop.service. May 13 00:50:24.536780 systemd[1]: Finished systemd-update-done.service. May 13 00:50:24.538102 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 00:50:24.538178 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 00:50:24.540633 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:50:24.540838 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 00:50:24.541989 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:50:24.543837 systemd[1]: Starting modprobe@drm.service... May 13 00:50:24.545559 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:50:24.547472 systemd[1]: Starting modprobe@loop.service... May 13 00:50:24.548361 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:50:24.548521 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:50:24.549786 systemd[1]: Starting systemd-networkd-wait-online.service... May 13 00:50:24.551092 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 13 00:50:24.551184 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:50:24.552463 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:50:24.552588 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:50:24.553867 systemd[1]: modprobe@drm.service: Deactivated successfully. May 13 00:50:24.553983 systemd[1]: Finished modprobe@drm.service. May 13 00:50:24.555112 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:50:24.555236 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:50:24.556496 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:50:24.556627 systemd[1]: Finished modprobe@loop.service. May 13 00:50:24.557893 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 00:50:24.557974 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 00:50:24.558872 systemd[1]: Finished ensure-sysext.service. May 13 00:50:24.562658 systemd-resolved[1225]: Positive Trust Anchors: May 13 00:50:24.562675 systemd-resolved[1225]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 13 00:50:24.562701 systemd-resolved[1225]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 13 00:50:24.569667 systemd-resolved[1225]: Defaulting to hostname 'linux'. May 13 00:50:24.570972 systemd[1]: Started systemd-resolved.service. May 13 00:50:24.571867 systemd[1]: Reached target network.target. May 13 00:50:24.572751 systemd[1]: Reached target nss-lookup.target. May 13 00:50:24.577406 systemd[1]: Started systemd-timesyncd.service. May 13 00:50:25.532416 systemd-resolved[1225]: Clock change detected. Flushing caches. May 13 00:50:25.532448 systemd-timesyncd[1227]: Contacted time server 10.0.0.1:123 (10.0.0.1). May 13 00:50:25.532452 systemd[1]: Reached target sysinit.target. May 13 00:50:25.532483 systemd-timesyncd[1227]: Initial clock synchronization to Tue 2025-05-13 00:50:25.532380 UTC. May 13 00:50:25.533318 systemd[1]: Started motdgen.path. May 13 00:50:25.534049 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 13 00:50:25.535157 systemd[1]: Started systemd-tmpfiles-clean.timer. May 13 00:50:25.536044 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 13 00:50:25.536066 systemd[1]: Reached target paths.target. May 13 00:50:25.536834 systemd[1]: Reached target time-set.target. May 13 00:50:25.537746 systemd[1]: Started logrotate.timer. May 13 00:50:25.538572 systemd[1]: Started mdadm.timer. May 13 00:50:25.539277 systemd[1]: Reached target timers.target. May 13 00:50:25.540294 systemd[1]: Listening on dbus.socket. May 13 00:50:25.541971 systemd[1]: Starting docker.socket... May 13 00:50:25.543561 systemd[1]: Listening on sshd.socket. May 13 00:50:25.544398 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:50:25.544658 systemd[1]: Listening on docker.socket. May 13 00:50:25.545464 systemd[1]: Reached target sockets.target. May 13 00:50:25.546258 systemd[1]: Reached target basic.target. May 13 00:50:25.547137 systemd[1]: System is tainted: cgroupsv1 May 13 00:50:25.547173 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 13 00:50:25.547192 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 13 00:50:25.548039 systemd[1]: Starting containerd.service... May 13 00:50:25.549660 systemd[1]: Starting dbus.service... May 13 00:50:25.551248 systemd[1]: Starting enable-oem-cloudinit.service... May 13 00:50:25.553066 systemd[1]: Starting extend-filesystems.service... May 13 00:50:25.554082 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 13 00:50:25.555935 jq[1282]: false May 13 00:50:25.555036 systemd[1]: Starting motdgen.service... May 13 00:50:25.557154 systemd[1]: Starting ssh-key-proc-cmdline.service... May 13 00:50:25.559096 systemd[1]: Starting sshd-keygen.service... May 13 00:50:25.564256 systemd[1]: Starting systemd-logind.service... May 13 00:50:25.570702 extend-filesystems[1283]: Found loop1 May 13 00:50:25.570702 extend-filesystems[1283]: Found sr0 May 13 00:50:25.570702 extend-filesystems[1283]: Found vda May 13 00:50:25.570702 extend-filesystems[1283]: Found vda1 May 13 00:50:25.570702 extend-filesystems[1283]: Found vda2 May 13 00:50:25.570702 extend-filesystems[1283]: Found vda3 May 13 00:50:25.570702 extend-filesystems[1283]: Found usr May 13 00:50:25.570702 extend-filesystems[1283]: Found vda4 May 13 00:50:25.570702 extend-filesystems[1283]: Found vda6 May 13 00:50:25.570702 extend-filesystems[1283]: Found vda7 May 13 00:50:25.570702 extend-filesystems[1283]: Found vda9 May 13 00:50:25.570702 extend-filesystems[1283]: Checking size of /dev/vda9 May 13 00:50:25.565170 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:50:25.584043 dbus-daemon[1281]: [system] SELinux support is enabled May 13 00:50:25.600215 extend-filesystems[1283]: Resized partition /dev/vda9 May 13 00:50:25.565222 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 13 00:50:25.617330 jq[1301]: true May 13 00:50:25.617487 extend-filesystems[1315]: resize2fs 1.46.5 (30-Dec-2021) May 13 00:50:25.566493 systemd[1]: Starting update-engine.service... May 13 00:50:25.568201 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 13 00:50:25.619092 jq[1308]: true May 13 00:50:25.570528 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 13 00:50:25.571653 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 13 00:50:25.571916 systemd[1]: motdgen.service: Deactivated successfully. May 13 00:50:25.572107 systemd[1]: Finished motdgen.service. May 13 00:50:25.573593 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 13 00:50:25.573830 systemd[1]: Finished ssh-key-proc-cmdline.service. May 13 00:50:25.584192 systemd[1]: Started dbus.service. May 13 00:50:25.587136 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 13 00:50:25.587153 systemd[1]: Reached target system-config.target. May 13 00:50:25.588109 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 13 00:50:25.588123 systemd[1]: Reached target user-config.target. May 13 00:50:25.624589 env[1309]: time="2025-05-13T00:50:25.623260082Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 13 00:50:25.638483 update_engine[1300]: I0513 00:50:25.638347 1300 main.cc:92] Flatcar Update Engine starting May 13 00:50:25.640005 systemd[1]: Started update-engine.service. May 13 00:50:25.640439 update_engine[1300]: I0513 00:50:25.640059 1300 update_check_scheduler.cc:74] Next update check in 10m4s May 13 00:50:25.642373 systemd[1]: Started locksmithd.service. May 13 00:50:25.644057 systemd-logind[1297]: Watching system buttons on /dev/input/event1 (Power Button) May 13 00:50:25.644873 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks May 13 00:50:25.644072 systemd-logind[1297]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 13 00:50:25.646151 systemd-logind[1297]: New seat seat0. May 13 00:50:25.653368 systemd[1]: Started systemd-logind.service. May 13 00:50:25.654364 env[1309]: time="2025-05-13T00:50:25.654329900Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 13 00:50:25.654565 env[1309]: time="2025-05-13T00:50:25.654548450Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 13 00:50:25.655781 env[1309]: time="2025-05-13T00:50:25.655737370Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.181-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 13 00:50:25.655781 env[1309]: time="2025-05-13T00:50:25.655775451Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 13 00:50:25.656057 env[1309]: time="2025-05-13T00:50:25.656026552Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 13 00:50:25.656057 env[1309]: time="2025-05-13T00:50:25.656045668Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 13 00:50:25.656057 env[1309]: time="2025-05-13T00:50:25.656058021Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 13 00:50:25.656147 env[1309]: time="2025-05-13T00:50:25.656067489Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 13 00:50:25.656147 env[1309]: time="2025-05-13T00:50:25.656124095Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 13 00:50:25.656326 env[1309]: time="2025-05-13T00:50:25.656298653Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 13 00:50:25.656455 env[1309]: time="2025-05-13T00:50:25.656434187Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 13 00:50:25.656455 env[1309]: time="2025-05-13T00:50:25.656451860Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 13 00:50:25.656522 env[1309]: time="2025-05-13T00:50:25.656492927Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 13 00:50:25.656522 env[1309]: time="2025-05-13T00:50:25.656502395Z" level=info msg="metadata content store policy set" policy=shared May 13 00:50:25.683830 kernel: EXT4-fs (vda9): resized filesystem to 1864699 May 13 00:50:25.694711 locksmithd[1340]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 13 00:50:25.707927 extend-filesystems[1315]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 13 00:50:25.707927 extend-filesystems[1315]: old_desc_blocks = 1, new_desc_blocks = 1 May 13 00:50:25.707927 extend-filesystems[1315]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. May 13 00:50:25.715091 extend-filesystems[1283]: Resized filesystem in /dev/vda9 May 13 00:50:25.716011 env[1309]: time="2025-05-13T00:50:25.714459526Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 13 00:50:25.716011 env[1309]: time="2025-05-13T00:50:25.714498669Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 13 00:50:25.716011 env[1309]: time="2025-05-13T00:50:25.714512646Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 13 00:50:25.716011 env[1309]: time="2025-05-13T00:50:25.714554684Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 13 00:50:25.716011 env[1309]: time="2025-05-13T00:50:25.714569011Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 13 00:50:25.716011 env[1309]: time="2025-05-13T00:50:25.714584019Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 13 00:50:25.716011 env[1309]: time="2025-05-13T00:50:25.714636328Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 13 00:50:25.716011 env[1309]: time="2025-05-13T00:50:25.714652408Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 13 00:50:25.716011 env[1309]: time="2025-05-13T00:50:25.714664991Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 13 00:50:25.716011 env[1309]: time="2025-05-13T00:50:25.714678036Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 13 00:50:25.716011 env[1309]: time="2025-05-13T00:50:25.714689978Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 13 00:50:25.716011 env[1309]: time="2025-05-13T00:50:25.714703323Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 13 00:50:25.716011 env[1309]: time="2025-05-13T00:50:25.714800345Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 13 00:50:25.716011 env[1309]: time="2025-05-13T00:50:25.714967218Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 13 00:50:25.708363 systemd[1]: extend-filesystems.service: Deactivated successfully. May 13 00:50:25.716408 bash[1335]: Updated "/home/core/.ssh/authorized_keys" May 13 00:50:25.716505 env[1309]: time="2025-05-13T00:50:25.715256230Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 13 00:50:25.716505 env[1309]: time="2025-05-13T00:50:25.715279023Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 13 00:50:25.716505 env[1309]: time="2025-05-13T00:50:25.715291827Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 13 00:50:25.716505 env[1309]: time="2025-05-13T00:50:25.715332163Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 13 00:50:25.716505 env[1309]: time="2025-05-13T00:50:25.715344626Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 13 00:50:25.716505 env[1309]: time="2025-05-13T00:50:25.715355867Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 13 00:50:25.716505 env[1309]: time="2025-05-13T00:50:25.715365736Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 13 00:50:25.716505 env[1309]: time="2025-05-13T00:50:25.715377658Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 13 00:50:25.716505 env[1309]: time="2025-05-13T00:50:25.715388869Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 13 00:50:25.716505 env[1309]: time="2025-05-13T00:50:25.715399279Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 13 00:50:25.716505 env[1309]: time="2025-05-13T00:50:25.715409458Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 13 00:50:25.716505 env[1309]: time="2025-05-13T00:50:25.715420168Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 13 00:50:25.716505 env[1309]: time="2025-05-13T00:50:25.715518803Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 13 00:50:25.716505 env[1309]: time="2025-05-13T00:50:25.715534212Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 13 00:50:25.716505 env[1309]: time="2025-05-13T00:50:25.715546815Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 13 00:50:25.708602 systemd[1]: Finished extend-filesystems.service. May 13 00:50:25.716865 env[1309]: time="2025-05-13T00:50:25.715557996Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 13 00:50:25.716865 env[1309]: time="2025-05-13T00:50:25.715572554Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 13 00:50:25.716865 env[1309]: time="2025-05-13T00:50:25.715581711Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 13 00:50:25.716865 env[1309]: time="2025-05-13T00:50:25.715601318Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 13 00:50:25.716865 env[1309]: time="2025-05-13T00:50:25.715645941Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 13 00:50:25.710778 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 13 00:50:25.716635 systemd[1]: Started containerd.service. May 13 00:50:25.717029 env[1309]: time="2025-05-13T00:50:25.715826750Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:false] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:false SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 13 00:50:25.717029 env[1309]: time="2025-05-13T00:50:25.715874991Z" level=info msg="Connect containerd service" May 13 00:50:25.717029 env[1309]: time="2025-05-13T00:50:25.715907432Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 13 00:50:25.717029 env[1309]: time="2025-05-13T00:50:25.716325195Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 13 00:50:25.717029 env[1309]: time="2025-05-13T00:50:25.716515312Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 13 00:50:25.717029 env[1309]: time="2025-05-13T00:50:25.716543705Z" level=info msg=serving... address=/run/containerd/containerd.sock May 13 00:50:25.717029 env[1309]: time="2025-05-13T00:50:25.716576737Z" level=info msg="containerd successfully booted in 0.093895s" May 13 00:50:25.718099 env[1309]: time="2025-05-13T00:50:25.717136187Z" level=info msg="Start subscribing containerd event" May 13 00:50:25.718099 env[1309]: time="2025-05-13T00:50:25.717188034Z" level=info msg="Start recovering state" May 13 00:50:25.718099 env[1309]: time="2025-05-13T00:50:25.717262544Z" level=info msg="Start event monitor" May 13 00:50:25.718099 env[1309]: time="2025-05-13T00:50:25.717284074Z" level=info msg="Start snapshots syncer" May 13 00:50:25.718099 env[1309]: time="2025-05-13T00:50:25.717293311Z" level=info msg="Start cni network conf syncer for default" May 13 00:50:25.718099 env[1309]: time="2025-05-13T00:50:25.717300034Z" level=info msg="Start streaming server" May 13 00:50:26.184437 sshd_keygen[1302]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 13 00:50:26.202001 systemd[1]: Finished sshd-keygen.service. May 13 00:50:26.204284 systemd[1]: Starting issuegen.service... May 13 00:50:26.208642 systemd[1]: issuegen.service: Deactivated successfully. May 13 00:50:26.208957 systemd[1]: Finished issuegen.service. May 13 00:50:26.210872 systemd[1]: Starting systemd-user-sessions.service... May 13 00:50:26.215045 systemd[1]: Finished systemd-user-sessions.service. May 13 00:50:26.217101 systemd[1]: Started getty@tty1.service. May 13 00:50:26.218848 systemd[1]: Started serial-getty@ttyS0.service. May 13 00:50:26.219874 systemd[1]: Reached target getty.target. May 13 00:50:26.595952 systemd-networkd[1084]: eth0: Gained IPv6LL May 13 00:50:26.597902 systemd[1]: Finished systemd-networkd-wait-online.service. May 13 00:50:26.599231 systemd[1]: Reached target network-online.target. May 13 00:50:26.601481 systemd[1]: Starting kubelet.service... May 13 00:50:27.143513 systemd[1]: Started kubelet.service. May 13 00:50:27.144798 systemd[1]: Reached target multi-user.target. May 13 00:50:27.146825 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 13 00:50:27.152609 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 13 00:50:27.152848 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 13 00:50:27.154637 systemd[1]: Startup finished in 4.593s (kernel) + 5.501s (userspace) = 10.094s. May 13 00:50:27.551441 kubelet[1375]: E0513 00:50:27.551343 1375 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 13 00:50:27.552956 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 13 00:50:27.553099 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 13 00:50:30.088506 systemd[1]: Created slice system-sshd.slice. May 13 00:50:30.089543 systemd[1]: Started sshd@0-10.0.0.142:22-10.0.0.1:53204.service. May 13 00:50:30.130836 sshd[1386]: Accepted publickey for core from 10.0.0.1 port 53204 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:50:30.132143 sshd[1386]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:50:30.140347 systemd-logind[1297]: New session 1 of user core. May 13 00:50:30.141142 systemd[1]: Created slice user-500.slice. May 13 00:50:30.141986 systemd[1]: Starting user-runtime-dir@500.service... May 13 00:50:30.149969 systemd[1]: Finished user-runtime-dir@500.service. May 13 00:50:30.151085 systemd[1]: Starting user@500.service... May 13 00:50:30.153936 (systemd)[1390]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 13 00:50:30.218284 systemd[1390]: Queued start job for default target default.target. May 13 00:50:30.218463 systemd[1390]: Reached target paths.target. May 13 00:50:30.218478 systemd[1390]: Reached target sockets.target. May 13 00:50:30.218488 systemd[1390]: Reached target timers.target. May 13 00:50:30.218499 systemd[1390]: Reached target basic.target. May 13 00:50:30.218532 systemd[1390]: Reached target default.target. May 13 00:50:30.218554 systemd[1390]: Startup finished in 59ms. May 13 00:50:30.218603 systemd[1]: Started user@500.service. May 13 00:50:30.219353 systemd[1]: Started session-1.scope. May 13 00:50:30.267955 systemd[1]: Started sshd@1-10.0.0.142:22-10.0.0.1:53206.service. May 13 00:50:30.307192 sshd[1400]: Accepted publickey for core from 10.0.0.1 port 53206 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:50:30.308162 sshd[1400]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:50:30.311102 systemd-logind[1297]: New session 2 of user core. May 13 00:50:30.311712 systemd[1]: Started session-2.scope. May 13 00:50:30.363920 sshd[1400]: pam_unix(sshd:session): session closed for user core May 13 00:50:30.365961 systemd[1]: Started sshd@2-10.0.0.142:22-10.0.0.1:53222.service. May 13 00:50:30.366330 systemd[1]: sshd@1-10.0.0.142:22-10.0.0.1:53206.service: Deactivated successfully. May 13 00:50:30.367266 systemd[1]: session-2.scope: Deactivated successfully. May 13 00:50:30.367676 systemd-logind[1297]: Session 2 logged out. Waiting for processes to exit. May 13 00:50:30.368455 systemd-logind[1297]: Removed session 2. May 13 00:50:30.404002 sshd[1405]: Accepted publickey for core from 10.0.0.1 port 53222 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:50:30.404941 sshd[1405]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:50:30.408540 systemd-logind[1297]: New session 3 of user core. May 13 00:50:30.409171 systemd[1]: Started session-3.scope. May 13 00:50:30.459482 sshd[1405]: pam_unix(sshd:session): session closed for user core May 13 00:50:30.462635 systemd[1]: Started sshd@3-10.0.0.142:22-10.0.0.1:53224.service. May 13 00:50:30.463330 systemd[1]: sshd@2-10.0.0.142:22-10.0.0.1:53222.service: Deactivated successfully. May 13 00:50:30.464351 systemd-logind[1297]: Session 3 logged out. Waiting for processes to exit. May 13 00:50:30.464380 systemd[1]: session-3.scope: Deactivated successfully. May 13 00:50:30.465644 systemd-logind[1297]: Removed session 3. May 13 00:50:30.500358 sshd[1413]: Accepted publickey for core from 10.0.0.1 port 53224 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:50:30.501286 sshd[1413]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:50:30.504669 systemd-logind[1297]: New session 4 of user core. May 13 00:50:30.505310 systemd[1]: Started session-4.scope. May 13 00:50:30.558257 sshd[1413]: pam_unix(sshd:session): session closed for user core May 13 00:50:30.560293 systemd[1]: Started sshd@4-10.0.0.142:22-10.0.0.1:53230.service. May 13 00:50:30.560657 systemd[1]: sshd@3-10.0.0.142:22-10.0.0.1:53224.service: Deactivated successfully. May 13 00:50:30.561466 systemd[1]: session-4.scope: Deactivated successfully. May 13 00:50:30.561482 systemd-logind[1297]: Session 4 logged out. Waiting for processes to exit. May 13 00:50:30.562310 systemd-logind[1297]: Removed session 4. May 13 00:50:30.598582 sshd[1419]: Accepted publickey for core from 10.0.0.1 port 53230 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:50:30.599546 sshd[1419]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:50:30.603158 systemd-logind[1297]: New session 5 of user core. May 13 00:50:30.604034 systemd[1]: Started session-5.scope. May 13 00:50:30.658577 sudo[1425]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 13 00:50:30.658770 sudo[1425]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 00:50:30.668013 dbus-daemon[1281]: \xd0-4\xd57V: received setenforce notice (enforcing=-2122334160) May 13 00:50:30.670216 sudo[1425]: pam_unix(sudo:session): session closed for user root May 13 00:50:30.671611 sshd[1419]: pam_unix(sshd:session): session closed for user core May 13 00:50:30.673952 systemd[1]: Started sshd@5-10.0.0.142:22-10.0.0.1:53240.service. May 13 00:50:30.674458 systemd[1]: sshd@4-10.0.0.142:22-10.0.0.1:53230.service: Deactivated successfully. May 13 00:50:30.675431 systemd-logind[1297]: Session 5 logged out. Waiting for processes to exit. May 13 00:50:30.675468 systemd[1]: session-5.scope: Deactivated successfully. May 13 00:50:30.676447 systemd-logind[1297]: Removed session 5. May 13 00:50:30.713401 sshd[1427]: Accepted publickey for core from 10.0.0.1 port 53240 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:50:30.714450 sshd[1427]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:50:30.717540 systemd-logind[1297]: New session 6 of user core. May 13 00:50:30.718153 systemd[1]: Started session-6.scope. May 13 00:50:30.770267 sudo[1434]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 13 00:50:30.770460 sudo[1434]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 00:50:30.772825 sudo[1434]: pam_unix(sudo:session): session closed for user root May 13 00:50:30.777015 sudo[1433]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 13 00:50:30.777208 sudo[1433]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 00:50:30.784760 systemd[1]: Stopping audit-rules.service... May 13 00:50:30.785000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 13 00:50:30.786073 auditctl[1437]: No rules May 13 00:50:30.786398 systemd[1]: audit-rules.service: Deactivated successfully. May 13 00:50:30.786606 systemd[1]: Stopped audit-rules.service. May 13 00:50:30.787894 systemd[1]: Starting audit-rules.service... May 13 00:50:30.788803 kernel: kauditd_printk_skb: 163 callbacks suppressed May 13 00:50:30.788858 kernel: audit: type=1305 audit(1747097430.785:140): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 13 00:50:30.788876 kernel: audit: type=1300 audit(1747097430.785:140): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd08a699d0 a2=420 a3=0 items=0 ppid=1 pid=1437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:30.785000 audit[1437]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd08a699d0 a2=420 a3=0 items=0 ppid=1 pid=1437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:30.785000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 13 00:50:30.794605 kernel: audit: type=1327 audit(1747097430.785:140): proctitle=2F7362696E2F617564697463746C002D44 May 13 00:50:30.794635 kernel: audit: type=1131 audit(1747097430.785:141): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:30.785000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:30.805331 augenrules[1455]: No rules May 13 00:50:30.805986 systemd[1]: Finished audit-rules.service. May 13 00:50:30.805000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:30.807606 sudo[1433]: pam_unix(sudo:session): session closed for user root May 13 00:50:30.806000 audit[1433]: USER_END pid=1433 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:50:30.809650 sshd[1427]: pam_unix(sshd:session): session closed for user core May 13 00:50:30.811917 systemd[1]: sshd@5-10.0.0.142:22-10.0.0.1:53240.service: Deactivated successfully. May 13 00:50:30.812720 systemd[1]: session-6.scope: Deactivated successfully. May 13 00:50:30.812936 kernel: audit: type=1130 audit(1747097430.805:142): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:30.812960 kernel: audit: type=1106 audit(1747097430.806:143): pid=1433 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:50:30.812976 kernel: audit: type=1104 audit(1747097430.806:144): pid=1433 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:50:30.806000 audit[1433]: CRED_DISP pid=1433 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:50:30.815252 systemd[1]: Started sshd@6-10.0.0.142:22-10.0.0.1:53242.service. May 13 00:50:30.815705 systemd-logind[1297]: Session 6 logged out. Waiting for processes to exit. May 13 00:50:30.816154 kernel: audit: type=1106 audit(1747097430.809:145): pid=1427 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:50:30.809000 audit[1427]: USER_END pid=1427 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:50:30.817259 systemd-logind[1297]: Removed session 6. May 13 00:50:30.809000 audit[1427]: CRED_DISP pid=1427 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:50:30.823745 kernel: audit: type=1104 audit(1747097430.809:146): pid=1427 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:50:30.823883 kernel: audit: type=1131 audit(1747097430.811:147): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.142:22-10.0.0.1:53240 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:30.811000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.142:22-10.0.0.1:53240 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:30.814000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.142:22-10.0.0.1:53242 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:30.856000 audit[1462]: USER_ACCT pid=1462 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:50:30.857671 sshd[1462]: Accepted publickey for core from 10.0.0.1 port 53242 ssh2: RSA SHA256:DdQ03puPlrcMVvAygFcBmS1VmnEhwtAiKRhWokZsFN8 May 13 00:50:30.857000 audit[1462]: CRED_ACQ pid=1462 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:50:30.857000 audit[1462]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc7751cff0 a2=3 a3=0 items=0 ppid=1 pid=1462 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:30.857000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:50:30.858632 sshd[1462]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:50:30.861848 systemd-logind[1297]: New session 7 of user core. May 13 00:50:30.862599 systemd[1]: Started session-7.scope. May 13 00:50:30.864000 audit[1462]: USER_START pid=1462 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:50:30.866000 audit[1465]: CRED_ACQ pid=1465 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:50:30.912000 audit[1466]: USER_ACCT pid=1466 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:50:30.912000 audit[1466]: CRED_REFR pid=1466 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:50:30.913540 sudo[1466]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 13 00:50:30.913720 sudo[1466]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 00:50:30.914000 audit[1466]: USER_START pid=1466 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:50:30.925141 systemd[1]: Starting coreos-metadata.service... May 13 00:50:30.932416 systemd[1]: coreos-metadata.service: Deactivated successfully. May 13 00:50:30.932602 systemd[1]: Finished coreos-metadata.service. May 13 00:50:30.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:30.932000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:31.339558 systemd[1]: Stopped kubelet.service. May 13 00:50:31.338000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:31.338000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:31.341717 systemd[1]: Starting kubelet.service... May 13 00:50:31.355261 systemd[1]: Reloading. May 13 00:50:31.412308 /usr/lib/systemd/system-generators/torcx-generator[1533]: time="2025-05-13T00:50:31Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 00:50:31.412331 /usr/lib/systemd/system-generators/torcx-generator[1533]: time="2025-05-13T00:50:31Z" level=info msg="torcx already run" May 13 00:50:31.709700 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 00:50:31.709716 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 00:50:31.726606 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 00:50:31.796130 systemd[1]: Started kubelet.service. May 13 00:50:31.795000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:31.798399 systemd[1]: Stopping kubelet.service... May 13 00:50:31.798822 systemd[1]: kubelet.service: Deactivated successfully. May 13 00:50:31.799025 systemd[1]: Stopped kubelet.service. May 13 00:50:31.798000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:31.800521 systemd[1]: Starting kubelet.service... May 13 00:50:31.870219 systemd[1]: Started kubelet.service. May 13 00:50:31.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:31.908721 kubelet[1596]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 13 00:50:31.908721 kubelet[1596]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 13 00:50:31.908721 kubelet[1596]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 13 00:50:31.909095 kubelet[1596]: I0513 00:50:31.908756 1596 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 13 00:50:32.261358 kubelet[1596]: I0513 00:50:32.261329 1596 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" May 13 00:50:32.261358 kubelet[1596]: I0513 00:50:32.261351 1596 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 13 00:50:32.261537 kubelet[1596]: I0513 00:50:32.261527 1596 server.go:927] "Client rotation is on, will bootstrap in background" May 13 00:50:32.271099 kubelet[1596]: I0513 00:50:32.271075 1596 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 13 00:50:32.279875 kubelet[1596]: I0513 00:50:32.279854 1596 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 13 00:50:32.280575 kubelet[1596]: I0513 00:50:32.280226 1596 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 13 00:50:32.280575 kubelet[1596]: I0513 00:50:32.280268 1596 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.0.0.142","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"cgroupfs","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} May 13 00:50:32.280575 kubelet[1596]: I0513 00:50:32.280517 1596 topology_manager.go:138] "Creating topology manager with none policy" May 13 00:50:32.280575 kubelet[1596]: I0513 00:50:32.280525 1596 container_manager_linux.go:301] "Creating device plugin manager" May 13 00:50:32.280748 kubelet[1596]: I0513 00:50:32.280615 1596 state_mem.go:36] "Initialized new in-memory state store" May 13 00:50:32.285235 kubelet[1596]: I0513 00:50:32.285222 1596 kubelet.go:400] "Attempting to sync node with API server" May 13 00:50:32.285290 kubelet[1596]: I0513 00:50:32.285238 1596 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" May 13 00:50:32.285290 kubelet[1596]: I0513 00:50:32.285255 1596 kubelet.go:312] "Adding apiserver pod source" May 13 00:50:32.285290 kubelet[1596]: I0513 00:50:32.285268 1596 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 13 00:50:32.286851 kubelet[1596]: E0513 00:50:32.286835 1596 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:50:32.286964 kubelet[1596]: E0513 00:50:32.286943 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:50:32.289513 kubelet[1596]: I0513 00:50:32.289497 1596 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 13 00:50:32.290498 kubelet[1596]: W0513 00:50:32.290483 1596 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope May 13 00:50:32.290619 kubelet[1596]: E0513 00:50:32.290578 1596 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope May 13 00:50:32.290619 kubelet[1596]: I0513 00:50:32.290544 1596 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 13 00:50:32.290703 kubelet[1596]: W0513 00:50:32.290524 1596 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "10.0.0.142" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope May 13 00:50:32.290703 kubelet[1596]: E0513 00:50:32.290635 1596 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.0.0.142" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope May 13 00:50:32.290703 kubelet[1596]: W0513 00:50:32.290622 1596 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 13 00:50:32.291074 kubelet[1596]: I0513 00:50:32.291060 1596 server.go:1264] "Started kubelet" May 13 00:50:32.291477 kubelet[1596]: I0513 00:50:32.291450 1596 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 13 00:50:32.292188 kubelet[1596]: I0513 00:50:32.292166 1596 server.go:455] "Adding debug handlers to kubelet server" May 13 00:50:32.293011 kubelet[1596]: I0513 00:50:32.292975 1596 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 13 00:50:32.293162 kubelet[1596]: I0513 00:50:32.293148 1596 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 13 00:50:32.305000 audit[1596]: AVC avc: denied { mac_admin } for pid=1596 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:32.305000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:50:32.305000 audit[1596]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000786540 a1=c0000589d8 a2=c000786510 a3=25 items=0 ppid=1 pid=1596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:32.305000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:50:32.305000 audit[1596]: AVC avc: denied { mac_admin } for pid=1596 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:32.305000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:50:32.305000 audit[1596]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0000b35e0 a1=c0000589f0 a2=c0007865d0 a3=25 items=0 ppid=1 pid=1596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:32.305000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:50:32.306794 kubelet[1596]: I0513 00:50:32.306482 1596 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 13 00:50:32.306794 kubelet[1596]: I0513 00:50:32.306509 1596 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 13 00:50:32.306794 kubelet[1596]: I0513 00:50:32.306547 1596 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 13 00:50:32.313093 kubelet[1596]: I0513 00:50:32.313065 1596 volume_manager.go:291] "Starting Kubelet Volume Manager" May 13 00:50:32.313808 kubelet[1596]: I0513 00:50:32.313784 1596 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 13 00:50:32.313877 kubelet[1596]: I0513 00:50:32.313853 1596 reconciler.go:26] "Reconciler: start to sync state" May 13 00:50:32.314297 kubelet[1596]: I0513 00:50:32.314266 1596 factory.go:221] Registration of the systemd container factory successfully May 13 00:50:32.314385 kubelet[1596]: I0513 00:50:32.314358 1596 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 13 00:50:32.320960 kubelet[1596]: E0513 00:50:32.320937 1596 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 13 00:50:32.321130 kubelet[1596]: E0513 00:50:32.321107 1596 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.0.0.142\" not found" node="10.0.0.142" May 13 00:50:32.321175 kubelet[1596]: I0513 00:50:32.321129 1596 factory.go:221] Registration of the containerd container factory successfully May 13 00:50:32.332603 kubelet[1596]: I0513 00:50:32.332574 1596 cpu_manager.go:214] "Starting CPU manager" policy="none" May 13 00:50:32.332603 kubelet[1596]: I0513 00:50:32.332589 1596 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 13 00:50:32.332603 kubelet[1596]: I0513 00:50:32.332603 1596 state_mem.go:36] "Initialized new in-memory state store" May 13 00:50:32.336000 audit[1610]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1610 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:50:32.336000 audit[1610]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff7ee81320 a2=0 a3=7fff7ee8130c items=0 ppid=1596 pid=1610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:32.336000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 13 00:50:32.337000 audit[1615]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1615 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:50:32.337000 audit[1615]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffe91042820 a2=0 a3=7ffe9104280c items=0 ppid=1596 pid=1615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:32.337000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 13 00:50:32.414622 kubelet[1596]: I0513 00:50:32.414594 1596 kubelet_node_status.go:73] "Attempting to register node" node="10.0.0.142" May 13 00:50:32.568642 kubelet[1596]: I0513 00:50:32.567408 1596 kubelet_node_status.go:76] "Successfully registered node" node="10.0.0.142" May 13 00:50:32.737224 kubelet[1596]: I0513 00:50:32.737203 1596 policy_none.go:49] "None policy: Start" May 13 00:50:32.737745 kubelet[1596]: I0513 00:50:32.737720 1596 memory_manager.go:170] "Starting memorymanager" policy="None" May 13 00:50:32.737840 kubelet[1596]: I0513 00:50:32.737807 1596 state_mem.go:35] "Initializing new in-memory state store" May 13 00:50:32.738052 kubelet[1596]: E0513 00:50:32.738019 1596 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.142\" not found" May 13 00:50:32.338000 audit[1617]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1617 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:50:32.338000 audit[1617]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffa5a048c0 a2=0 a3=7fffa5a048ac items=0 ppid=1596 pid=1617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:32.338000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 00:50:32.741000 audit[1623]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1623 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:50:32.741000 audit[1623]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdd016e5a0 a2=0 a3=7ffdd016e58c items=0 ppid=1596 pid=1623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:32.741000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 00:50:32.746426 kubelet[1596]: I0513 00:50:32.746399 1596 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 13 00:50:32.745000 audit[1596]: AVC avc: denied { mac_admin } for pid=1596 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:32.745000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:50:32.745000 audit[1596]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000855350 a1=c000838a50 a2=c000855320 a3=25 items=0 ppid=1 pid=1596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:32.745000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:50:32.746598 kubelet[1596]: I0513 00:50:32.746465 1596 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 13 00:50:32.746598 kubelet[1596]: I0513 00:50:32.746570 1596 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 13 00:50:32.746689 kubelet[1596]: I0513 00:50:32.746664 1596 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 13 00:50:32.747774 kubelet[1596]: E0513 00:50:32.747755 1596 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.142\" not found" May 13 00:50:32.773000 audit[1628]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1628 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:50:32.773000 audit[1628]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffef00a50b0 a2=0 a3=7ffef00a509c items=0 ppid=1596 pid=1628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:32.773000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 13 00:50:32.774986 kubelet[1596]: I0513 00:50:32.774959 1596 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 13 00:50:32.774000 audit[1629]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1629 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:50:32.774000 audit[1629]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe1e491ee0 a2=0 a3=7ffe1e491ecc items=0 ppid=1596 pid=1629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:32.774000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 13 00:50:32.774000 audit[1630]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1630 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:50:32.774000 audit[1630]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff279eefe0 a2=0 a3=7fff279eefcc items=0 ppid=1596 pid=1630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:32.774000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 13 00:50:32.775912 kubelet[1596]: I0513 00:50:32.775873 1596 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 13 00:50:32.775912 kubelet[1596]: I0513 00:50:32.775898 1596 status_manager.go:217] "Starting to sync pod status with apiserver" May 13 00:50:32.775912 kubelet[1596]: I0513 00:50:32.775914 1596 kubelet.go:2337] "Starting kubelet main sync loop" May 13 00:50:32.776069 kubelet[1596]: E0513 00:50:32.775949 1596 kubelet.go:2361] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" May 13 00:50:32.775000 audit[1631]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1631 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:50:32.775000 audit[1631]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcef397580 a2=0 a3=7ffcef39756c items=0 ppid=1596 pid=1631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:32.775000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 13 00:50:32.776000 audit[1633]: NETFILTER_CFG table=nat:10 family=10 entries=2 op=nft_register_chain pid=1633 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:50:32.776000 audit[1633]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fffe4730b70 a2=0 a3=7fffe4730b5c items=0 ppid=1596 pid=1633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:32.776000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 13 00:50:32.776000 audit[1632]: NETFILTER_CFG table=nat:11 family=2 entries=2 op=nft_register_chain pid=1632 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:50:32.776000 audit[1632]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffdb610ba80 a2=0 a3=7ffdb610ba6c items=0 ppid=1596 pid=1632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:32.776000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 13 00:50:32.777000 audit[1635]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1635 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:50:32.777000 audit[1635]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc55c11640 a2=0 a3=7ffc55c1162c items=0 ppid=1596 pid=1635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:32.777000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 13 00:50:32.777000 audit[1634]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1634 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:50:32.777000 audit[1634]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffebd7ff820 a2=0 a3=10e3 items=0 ppid=1596 pid=1634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:32.777000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 13 00:50:32.838206 kubelet[1596]: E0513 00:50:32.838102 1596 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.142\" not found" May 13 00:50:32.881209 sudo[1466]: pam_unix(sudo:session): session closed for user root May 13 00:50:32.880000 audit[1466]: USER_END pid=1466 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:50:32.880000 audit[1466]: CRED_DISP pid=1466 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:50:32.882279 sshd[1462]: pam_unix(sshd:session): session closed for user core May 13 00:50:32.882000 audit[1462]: USER_END pid=1462 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:50:32.882000 audit[1462]: CRED_DISP pid=1462 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 13 00:50:32.884081 systemd[1]: sshd@6-10.0.0.142:22-10.0.0.1:53242.service: Deactivated successfully. May 13 00:50:32.883000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.142:22-10.0.0.1:53242 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:32.885018 systemd-logind[1297]: Session 7 logged out. Waiting for processes to exit. May 13 00:50:32.885053 systemd[1]: session-7.scope: Deactivated successfully. May 13 00:50:32.885843 systemd-logind[1297]: Removed session 7. May 13 00:50:32.938873 kubelet[1596]: E0513 00:50:32.938841 1596 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.142\" not found" May 13 00:50:33.039364 kubelet[1596]: E0513 00:50:33.039335 1596 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.142\" not found" May 13 00:50:33.139913 kubelet[1596]: E0513 00:50:33.139852 1596 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.142\" not found" May 13 00:50:33.240748 kubelet[1596]: E0513 00:50:33.240708 1596 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.142\" not found" May 13 00:50:33.262923 kubelet[1596]: I0513 00:50:33.262889 1596 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" May 13 00:50:33.263033 kubelet[1596]: W0513 00:50:33.263000 1596 reflector.go:470] k8s.io/client-go/informers/factory.go:160: watch of *v1.CSIDriver ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 13 00:50:33.263146 kubelet[1596]: W0513 00:50:33.263039 1596 reflector.go:470] k8s.io/client-go/informers/factory.go:160: watch of *v1.Service ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 13 00:50:33.263146 kubelet[1596]: W0513 00:50:33.263064 1596 reflector.go:470] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 13 00:50:33.287228 kubelet[1596]: E0513 00:50:33.287188 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:50:33.341498 kubelet[1596]: E0513 00:50:33.341467 1596 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.142\" not found" May 13 00:50:33.442642 kubelet[1596]: I0513 00:50:33.442559 1596 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" May 13 00:50:33.443015 env[1309]: time="2025-05-13T00:50:33.442947280Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 13 00:50:33.443347 kubelet[1596]: I0513 00:50:33.443243 1596 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" May 13 00:50:34.287875 kubelet[1596]: I0513 00:50:34.287838 1596 apiserver.go:52] "Watching apiserver" May 13 00:50:34.288301 kubelet[1596]: E0513 00:50:34.288258 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:50:34.291151 kubelet[1596]: I0513 00:50:34.291121 1596 topology_manager.go:215] "Topology Admit Handler" podUID="03f954e2-f072-4436-8bdd-c3951957431c" podNamespace="calico-system" podName="calico-node-rjbjt" May 13 00:50:34.291239 kubelet[1596]: I0513 00:50:34.291222 1596 topology_manager.go:215] "Topology Admit Handler" podUID="a5a07571-4660-42ee-a93f-618103603d07" podNamespace="calico-system" podName="csi-node-driver-jgsmr" May 13 00:50:34.291324 kubelet[1596]: I0513 00:50:34.291307 1596 topology_manager.go:215] "Topology Admit Handler" podUID="d65a3dab-18a1-4fe9-8a33-5668b7241a7f" podNamespace="kube-system" podName="kube-proxy-5pxpg" May 13 00:50:34.291546 kubelet[1596]: E0513 00:50:34.291497 1596 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-jgsmr" podUID="a5a07571-4660-42ee-a93f-618103603d07" May 13 00:50:34.315606 kubelet[1596]: I0513 00:50:34.315575 1596 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 13 00:50:34.322639 kubelet[1596]: I0513 00:50:34.322610 1596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/d65a3dab-18a1-4fe9-8a33-5668b7241a7f-kube-proxy\") pod \"kube-proxy-5pxpg\" (UID: \"d65a3dab-18a1-4fe9-8a33-5668b7241a7f\") " pod="kube-system/kube-proxy-5pxpg" May 13 00:50:34.322698 kubelet[1596]: I0513 00:50:34.322641 1596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/03f954e2-f072-4436-8bdd-c3951957431c-policysync\") pod \"calico-node-rjbjt\" (UID: \"03f954e2-f072-4436-8bdd-c3951957431c\") " pod="calico-system/calico-node-rjbjt" May 13 00:50:34.322698 kubelet[1596]: I0513 00:50:34.322659 1596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/03f954e2-f072-4436-8bdd-c3951957431c-cni-log-dir\") pod \"calico-node-rjbjt\" (UID: \"03f954e2-f072-4436-8bdd-c3951957431c\") " pod="calico-system/calico-node-rjbjt" May 13 00:50:34.322698 kubelet[1596]: I0513 00:50:34.322673 1596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/a5a07571-4660-42ee-a93f-618103603d07-varrun\") pod \"csi-node-driver-jgsmr\" (UID: \"a5a07571-4660-42ee-a93f-618103603d07\") " pod="calico-system/csi-node-driver-jgsmr" May 13 00:50:34.322698 kubelet[1596]: I0513 00:50:34.322691 1596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/a5a07571-4660-42ee-a93f-618103603d07-kubelet-dir\") pod \"csi-node-driver-jgsmr\" (UID: \"a5a07571-4660-42ee-a93f-618103603d07\") " pod="calico-system/csi-node-driver-jgsmr" May 13 00:50:34.322791 kubelet[1596]: I0513 00:50:34.322707 1596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tn285\" (UniqueName: \"kubernetes.io/projected/d65a3dab-18a1-4fe9-8a33-5668b7241a7f-kube-api-access-tn285\") pod \"kube-proxy-5pxpg\" (UID: \"d65a3dab-18a1-4fe9-8a33-5668b7241a7f\") " pod="kube-system/kube-proxy-5pxpg" May 13 00:50:34.322791 kubelet[1596]: I0513 00:50:34.322724 1596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/03f954e2-f072-4436-8bdd-c3951957431c-node-certs\") pod \"calico-node-rjbjt\" (UID: \"03f954e2-f072-4436-8bdd-c3951957431c\") " pod="calico-system/calico-node-rjbjt" May 13 00:50:34.322791 kubelet[1596]: I0513 00:50:34.322738 1596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/03f954e2-f072-4436-8bdd-c3951957431c-var-run-calico\") pod \"calico-node-rjbjt\" (UID: \"03f954e2-f072-4436-8bdd-c3951957431c\") " pod="calico-system/calico-node-rjbjt" May 13 00:50:34.322871 kubelet[1596]: I0513 00:50:34.322792 1596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/03f954e2-f072-4436-8bdd-c3951957431c-var-lib-calico\") pod \"calico-node-rjbjt\" (UID: \"03f954e2-f072-4436-8bdd-c3951957431c\") " pod="calico-system/calico-node-rjbjt" May 13 00:50:34.322871 kubelet[1596]: I0513 00:50:34.322846 1596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/a5a07571-4660-42ee-a93f-618103603d07-socket-dir\") pod \"csi-node-driver-jgsmr\" (UID: \"a5a07571-4660-42ee-a93f-618103603d07\") " pod="calico-system/csi-node-driver-jgsmr" May 13 00:50:34.322871 kubelet[1596]: I0513 00:50:34.322867 1596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/d65a3dab-18a1-4fe9-8a33-5668b7241a7f-xtables-lock\") pod \"kube-proxy-5pxpg\" (UID: \"d65a3dab-18a1-4fe9-8a33-5668b7241a7f\") " pod="kube-system/kube-proxy-5pxpg" May 13 00:50:34.322937 kubelet[1596]: I0513 00:50:34.322889 1596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/d65a3dab-18a1-4fe9-8a33-5668b7241a7f-lib-modules\") pod \"kube-proxy-5pxpg\" (UID: \"d65a3dab-18a1-4fe9-8a33-5668b7241a7f\") " pod="kube-system/kube-proxy-5pxpg" May 13 00:50:34.322937 kubelet[1596]: I0513 00:50:34.322910 1596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/03f954e2-f072-4436-8bdd-c3951957431c-xtables-lock\") pod \"calico-node-rjbjt\" (UID: \"03f954e2-f072-4436-8bdd-c3951957431c\") " pod="calico-system/calico-node-rjbjt" May 13 00:50:34.322937 kubelet[1596]: I0513 00:50:34.322927 1596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/03f954e2-f072-4436-8bdd-c3951957431c-tigera-ca-bundle\") pod \"calico-node-rjbjt\" (UID: \"03f954e2-f072-4436-8bdd-c3951957431c\") " pod="calico-system/calico-node-rjbjt" May 13 00:50:34.323009 kubelet[1596]: I0513 00:50:34.322953 1596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/03f954e2-f072-4436-8bdd-c3951957431c-cni-net-dir\") pod \"calico-node-rjbjt\" (UID: \"03f954e2-f072-4436-8bdd-c3951957431c\") " pod="calico-system/calico-node-rjbjt" May 13 00:50:34.323009 kubelet[1596]: I0513 00:50:34.322988 1596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-h489d\" (UniqueName: \"kubernetes.io/projected/03f954e2-f072-4436-8bdd-c3951957431c-kube-api-access-h489d\") pod \"calico-node-rjbjt\" (UID: \"03f954e2-f072-4436-8bdd-c3951957431c\") " pod="calico-system/calico-node-rjbjt" May 13 00:50:34.323053 kubelet[1596]: I0513 00:50:34.323015 1596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/a5a07571-4660-42ee-a93f-618103603d07-registration-dir\") pod \"csi-node-driver-jgsmr\" (UID: \"a5a07571-4660-42ee-a93f-618103603d07\") " pod="calico-system/csi-node-driver-jgsmr" May 13 00:50:34.323053 kubelet[1596]: I0513 00:50:34.323037 1596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7s85f\" (UniqueName: \"kubernetes.io/projected/a5a07571-4660-42ee-a93f-618103603d07-kube-api-access-7s85f\") pod \"csi-node-driver-jgsmr\" (UID: \"a5a07571-4660-42ee-a93f-618103603d07\") " pod="calico-system/csi-node-driver-jgsmr" May 13 00:50:34.323095 kubelet[1596]: I0513 00:50:34.323054 1596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/03f954e2-f072-4436-8bdd-c3951957431c-flexvol-driver-host\") pod \"calico-node-rjbjt\" (UID: \"03f954e2-f072-4436-8bdd-c3951957431c\") " pod="calico-system/calico-node-rjbjt" May 13 00:50:34.323095 kubelet[1596]: I0513 00:50:34.323074 1596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/03f954e2-f072-4436-8bdd-c3951957431c-lib-modules\") pod \"calico-node-rjbjt\" (UID: \"03f954e2-f072-4436-8bdd-c3951957431c\") " pod="calico-system/calico-node-rjbjt" May 13 00:50:34.323141 kubelet[1596]: I0513 00:50:34.323094 1596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/03f954e2-f072-4436-8bdd-c3951957431c-cni-bin-dir\") pod \"calico-node-rjbjt\" (UID: \"03f954e2-f072-4436-8bdd-c3951957431c\") " pod="calico-system/calico-node-rjbjt" May 13 00:50:34.425298 kubelet[1596]: E0513 00:50:34.425274 1596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:50:34.425298 kubelet[1596]: W0513 00:50:34.425296 1596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:50:34.425410 kubelet[1596]: E0513 00:50:34.425315 1596 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:50:34.427491 kubelet[1596]: E0513 00:50:34.427454 1596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:50:34.427491 kubelet[1596]: W0513 00:50:34.427476 1596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:50:34.427653 kubelet[1596]: E0513 00:50:34.427500 1596 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:50:34.434142 kubelet[1596]: E0513 00:50:34.434125 1596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:50:34.434212 kubelet[1596]: W0513 00:50:34.434142 1596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:50:34.434212 kubelet[1596]: E0513 00:50:34.434161 1596 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:50:34.435514 kubelet[1596]: E0513 00:50:34.435494 1596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:50:34.435514 kubelet[1596]: W0513 00:50:34.435510 1596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:50:34.435608 kubelet[1596]: E0513 00:50:34.435529 1596 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:50:34.435761 kubelet[1596]: E0513 00:50:34.435730 1596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:50:34.435761 kubelet[1596]: W0513 00:50:34.435746 1596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:50:34.435761 kubelet[1596]: E0513 00:50:34.435760 1596 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:50:34.595016 kubelet[1596]: E0513 00:50:34.594203 1596 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:50:34.595016 kubelet[1596]: E0513 00:50:34.594522 1596 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:50:34.595213 env[1309]: time="2025-05-13T00:50:34.594840643Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-rjbjt,Uid:03f954e2-f072-4436-8bdd-c3951957431c,Namespace:calico-system,Attempt:0,}" May 13 00:50:34.595213 env[1309]: time="2025-05-13T00:50:34.594994401Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-5pxpg,Uid:d65a3dab-18a1-4fe9-8a33-5668b7241a7f,Namespace:kube-system,Attempt:0,}" May 13 00:50:35.289049 kubelet[1596]: E0513 00:50:35.289008 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:50:35.469697 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount423133695.mount: Deactivated successfully. May 13 00:50:35.475712 env[1309]: time="2025-05-13T00:50:35.475676539Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:50:35.478240 env[1309]: time="2025-05-13T00:50:35.478209951Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:50:35.479867 env[1309]: time="2025-05-13T00:50:35.479834017Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:50:35.480440 env[1309]: time="2025-05-13T00:50:35.480419866Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:50:35.481897 env[1309]: time="2025-05-13T00:50:35.481852473Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:50:35.483080 env[1309]: time="2025-05-13T00:50:35.483041974Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:50:35.484387 env[1309]: time="2025-05-13T00:50:35.484359836Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:50:35.486657 env[1309]: time="2025-05-13T00:50:35.486630636Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:50:35.508393 env[1309]: time="2025-05-13T00:50:35.502107175Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:50:35.508393 env[1309]: time="2025-05-13T00:50:35.502189389Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:50:35.508393 env[1309]: time="2025-05-13T00:50:35.502206221Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:50:35.508393 env[1309]: time="2025-05-13T00:50:35.502361412Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d725a8c0290d342d194b1a63417dbb15c71ad87c7fcf0d7b9d0d3f85ccb6240e pid=1656 runtime=io.containerd.runc.v2 May 13 00:50:35.508393 env[1309]: time="2025-05-13T00:50:35.506225851Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:50:35.508393 env[1309]: time="2025-05-13T00:50:35.506264112Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:50:35.508393 env[1309]: time="2025-05-13T00:50:35.506274592Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:50:35.508393 env[1309]: time="2025-05-13T00:50:35.506418993Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6403e51a4980af5816e58bb2b5c8f51e08423da36d6007b0172a5de4e9983d43 pid=1675 runtime=io.containerd.runc.v2 May 13 00:50:35.534982 env[1309]: time="2025-05-13T00:50:35.534463547Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-rjbjt,Uid:03f954e2-f072-4436-8bdd-c3951957431c,Namespace:calico-system,Attempt:0,} returns sandbox id \"d725a8c0290d342d194b1a63417dbb15c71ad87c7fcf0d7b9d0d3f85ccb6240e\"" May 13 00:50:35.535240 kubelet[1596]: E0513 00:50:35.535210 1596 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:50:35.537724 env[1309]: time="2025-05-13T00:50:35.537701320Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 13 00:50:35.545019 env[1309]: time="2025-05-13T00:50:35.544925871Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-5pxpg,Uid:d65a3dab-18a1-4fe9-8a33-5668b7241a7f,Namespace:kube-system,Attempt:0,} returns sandbox id \"6403e51a4980af5816e58bb2b5c8f51e08423da36d6007b0172a5de4e9983d43\"" May 13 00:50:35.545882 kubelet[1596]: E0513 00:50:35.545862 1596 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:50:35.776450 kubelet[1596]: E0513 00:50:35.776413 1596 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-jgsmr" podUID="a5a07571-4660-42ee-a93f-618103603d07" May 13 00:50:36.289359 kubelet[1596]: E0513 00:50:36.289307 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:50:37.161629 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1068676423.mount: Deactivated successfully. May 13 00:50:37.281795 env[1309]: time="2025-05-13T00:50:37.281748564Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:50:37.283562 env[1309]: time="2025-05-13T00:50:37.283534083Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:50:37.285181 env[1309]: time="2025-05-13T00:50:37.285150385Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:50:37.286376 env[1309]: time="2025-05-13T00:50:37.286342611Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:50:37.286880 env[1309]: time="2025-05-13T00:50:37.286850423Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5\"" May 13 00:50:37.287925 env[1309]: time="2025-05-13T00:50:37.287868513Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.12\"" May 13 00:50:37.289048 env[1309]: time="2025-05-13T00:50:37.289006217Z" level=info msg="CreateContainer within sandbox \"d725a8c0290d342d194b1a63417dbb15c71ad87c7fcf0d7b9d0d3f85ccb6240e\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 13 00:50:37.290021 kubelet[1596]: E0513 00:50:37.289983 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:50:37.302716 env[1309]: time="2025-05-13T00:50:37.302672461Z" level=info msg="CreateContainer within sandbox \"d725a8c0290d342d194b1a63417dbb15c71ad87c7fcf0d7b9d0d3f85ccb6240e\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"9a9ccc17d0a44a5eb549d7ba59023fc71955f1a77e16aafef09aa84e4c584a60\"" May 13 00:50:37.303241 env[1309]: time="2025-05-13T00:50:37.303204068Z" level=info msg="StartContainer for \"9a9ccc17d0a44a5eb549d7ba59023fc71955f1a77e16aafef09aa84e4c584a60\"" May 13 00:50:37.347986 env[1309]: time="2025-05-13T00:50:37.347943977Z" level=info msg="StartContainer for \"9a9ccc17d0a44a5eb549d7ba59023fc71955f1a77e16aafef09aa84e4c584a60\" returns successfully" May 13 00:50:37.478582 env[1309]: time="2025-05-13T00:50:37.478454618Z" level=info msg="shim disconnected" id=9a9ccc17d0a44a5eb549d7ba59023fc71955f1a77e16aafef09aa84e4c584a60 May 13 00:50:37.478582 env[1309]: time="2025-05-13T00:50:37.478516063Z" level=warning msg="cleaning up after shim disconnected" id=9a9ccc17d0a44a5eb549d7ba59023fc71955f1a77e16aafef09aa84e4c584a60 namespace=k8s.io May 13 00:50:37.478582 env[1309]: time="2025-05-13T00:50:37.478525942Z" level=info msg="cleaning up dead shim" May 13 00:50:37.484716 env[1309]: time="2025-05-13T00:50:37.484675246Z" level=warning msg="cleanup warnings time=\"2025-05-13T00:50:37Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1778 runtime=io.containerd.runc.v2\n" May 13 00:50:37.776256 kubelet[1596]: E0513 00:50:37.776146 1596 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-jgsmr" podUID="a5a07571-4660-42ee-a93f-618103603d07" May 13 00:50:37.784326 kubelet[1596]: E0513 00:50:37.784276 1596 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:50:38.290979 kubelet[1596]: E0513 00:50:38.290943 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:50:38.882328 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1519141639.mount: Deactivated successfully. May 13 00:50:39.292110 kubelet[1596]: E0513 00:50:39.291999 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:50:39.422911 env[1309]: time="2025-05-13T00:50:39.422853274Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:50:39.424793 env[1309]: time="2025-05-13T00:50:39.424747107Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c9356fea5d151501039907c3ba870272461396117eabc74063632616f4e31b2b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:50:39.426323 env[1309]: time="2025-05-13T00:50:39.426274061Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:50:39.427464 env[1309]: time="2025-05-13T00:50:39.427429859Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:ea8c7d5392acf6b0c11ebba78301e1a6c2dc6abcd7544102ed578e49d1c82f15,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:50:39.427800 env[1309]: time="2025-05-13T00:50:39.427768644Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.12\" returns image reference \"sha256:c9356fea5d151501039907c3ba870272461396117eabc74063632616f4e31b2b\"" May 13 00:50:39.428776 env[1309]: time="2025-05-13T00:50:39.428747841Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 13 00:50:39.429711 env[1309]: time="2025-05-13T00:50:39.429679528Z" level=info msg="CreateContainer within sandbox \"6403e51a4980af5816e58bb2b5c8f51e08423da36d6007b0172a5de4e9983d43\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 13 00:50:39.440898 env[1309]: time="2025-05-13T00:50:39.440852766Z" level=info msg="CreateContainer within sandbox \"6403e51a4980af5816e58bb2b5c8f51e08423da36d6007b0172a5de4e9983d43\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"3afc383cdee99b852954cdd2b360467c8e2acbfbcebc4164aa7b1968d376b8fd\"" May 13 00:50:39.441321 env[1309]: time="2025-05-13T00:50:39.441293733Z" level=info msg="StartContainer for \"3afc383cdee99b852954cdd2b360467c8e2acbfbcebc4164aa7b1968d376b8fd\"" May 13 00:50:39.483325 env[1309]: time="2025-05-13T00:50:39.483280629Z" level=info msg="StartContainer for \"3afc383cdee99b852954cdd2b360467c8e2acbfbcebc4164aa7b1968d376b8fd\" returns successfully" May 13 00:50:39.537859 kernel: kauditd_printk_skb: 71 callbacks suppressed May 13 00:50:39.537971 kernel: audit: type=1325 audit(1747097439.534:184): table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1856 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:50:39.534000 audit[1856]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1856 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:50:39.534000 audit[1856]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffed541c4c0 a2=0 a3=7ffed541c4ac items=0 ppid=1812 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:39.543453 kernel: audit: type=1300 audit(1747097439.534:184): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffed541c4c0 a2=0 a3=7ffed541c4ac items=0 ppid=1812 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:39.543517 kernel: audit: type=1327 audit(1747097439.534:184): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 13 00:50:39.534000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 13 00:50:39.534000 audit[1857]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1857 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:50:39.548036 kernel: audit: type=1325 audit(1747097439.534:185): table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1857 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:50:39.548062 kernel: audit: type=1300 audit(1747097439.534:185): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff70a45cd0 a2=0 a3=7fff70a45cbc items=0 ppid=1812 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:39.534000 audit[1857]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff70a45cd0 a2=0 a3=7fff70a45cbc items=0 ppid=1812 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:39.552477 kernel: audit: type=1327 audit(1747097439.534:185): proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 13 00:50:39.534000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 13 00:50:39.538000 audit[1859]: NETFILTER_CFG table=nat:16 family=10 entries=1 op=nft_register_chain pid=1859 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:50:39.556799 kernel: audit: type=1325 audit(1747097439.538:186): table=nat:16 family=10 entries=1 op=nft_register_chain pid=1859 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:50:39.556840 kernel: audit: type=1300 audit(1747097439.538:186): arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff9a6733a0 a2=0 a3=7fff9a67338c items=0 ppid=1812 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:39.538000 audit[1859]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff9a6733a0 a2=0 a3=7fff9a67338c items=0 ppid=1812 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:39.561226 kernel: audit: type=1327 audit(1747097439.538:186): proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 13 00:50:39.538000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 13 00:50:39.563380 kernel: audit: type=1325 audit(1747097439.539:187): table=nat:17 family=2 entries=1 op=nft_register_chain pid=1858 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:50:39.539000 audit[1858]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_chain pid=1858 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:50:39.539000 audit[1858]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc5abd3910 a2=0 a3=7ffc5abd38fc items=0 ppid=1812 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:39.539000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 13 00:50:39.539000 audit[1860]: NETFILTER_CFG table=filter:18 family=10 entries=1 op=nft_register_chain pid=1860 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:50:39.539000 audit[1860]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd7e71c1b0 a2=0 a3=7ffd7e71c19c items=0 ppid=1812 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:39.539000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 13 00:50:39.540000 audit[1861]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=1861 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:50:39.540000 audit[1861]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff82e6a930 a2=0 a3=7fff82e6a91c items=0 ppid=1812 pid=1861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:39.540000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 13 00:50:39.640000 audit[1862]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1862 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:50:39.640000 audit[1862]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc9a7fcb00 a2=0 a3=7ffc9a7fcaec items=0 ppid=1812 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:39.640000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 13 00:50:39.642000 audit[1864]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1864 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:50:39.642000 audit[1864]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe64dd0350 a2=0 a3=7ffe64dd033c items=0 ppid=1812 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:39.642000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 13 00:50:39.645000 audit[1867]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1867 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:50:39.645000 audit[1867]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe9bfaf480 a2=0 a3=7ffe9bfaf46c items=0 ppid=1812 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:39.645000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 13 00:50:39.646000 audit[1868]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1868 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:50:39.646000 audit[1868]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe9d47fe80 a2=0 a3=7ffe9d47fe6c items=0 ppid=1812 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:39.646000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 13 00:50:39.647000 audit[1870]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1870 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:50:39.647000 audit[1870]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff2f6e62f0 a2=0 a3=7fff2f6e62dc items=0 ppid=1812 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:39.647000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 13 00:50:39.648000 audit[1871]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1871 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:50:39.648000 audit[1871]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe73f69320 a2=0 a3=7ffe73f6930c items=0 ppid=1812 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:39.648000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 13 00:50:39.650000 audit[1873]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1873 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:50:39.650000 audit[1873]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd46184ca0 a2=0 a3=7ffd46184c8c items=0 ppid=1812 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:39.650000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 13 00:50:39.653000 audit[1876]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1876 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:50:39.653000 audit[1876]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff867503c0 a2=0 a3=7fff867503ac items=0 ppid=1812 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:39.653000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 13 00:50:39.654000 audit[1877]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1877 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:50:39.654000 audit[1877]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe5712c730 a2=0 a3=7ffe5712c71c items=0 ppid=1812 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:39.654000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 13 00:50:39.656000 audit[1879]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1879 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:50:39.656000 audit[1879]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdb6ce4af0 a2=0 a3=7ffdb6ce4adc items=0 ppid=1812 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:39.656000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 13 00:50:39.657000 audit[1880]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1880 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:50:39.657000 audit[1880]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffea15ce0e0 a2=0 a3=7ffea15ce0cc items=0 ppid=1812 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:39.657000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 13 00:50:39.658000 audit[1882]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1882 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:50:39.658000 audit[1882]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdfb5bbd90 a2=0 a3=7ffdfb5bbd7c items=0 ppid=1812 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:39.658000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 13 00:50:39.661000 audit[1885]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1885 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:50:39.661000 audit[1885]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff62752520 a2=0 a3=7fff6275250c items=0 ppid=1812 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:39.661000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 13 00:50:39.664000 audit[1888]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1888 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:50:39.664000 audit[1888]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdba9369f0 a2=0 a3=7ffdba9369dc items=0 ppid=1812 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:39.664000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 13 00:50:39.664000 audit[1889]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1889 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:50:39.664000 audit[1889]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc740ddf50 a2=0 a3=7ffc740ddf3c items=0 ppid=1812 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:39.664000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 13 00:50:39.666000 audit[1891]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1891 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:50:39.666000 audit[1891]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffdc36da4b0 a2=0 a3=7ffdc36da49c items=0 ppid=1812 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:39.666000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 00:50:39.684000 audit[1897]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1897 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:50:39.684000 audit[1897]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe5e452df0 a2=0 a3=7ffe5e452ddc items=0 ppid=1812 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:39.684000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 00:50:39.684000 audit[1898]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1898 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:50:39.684000 audit[1898]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe3b607b10 a2=0 a3=7ffe3b607afc items=0 ppid=1812 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:39.684000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 13 00:50:39.686000 audit[1900]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1900 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:50:39.686000 audit[1900]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd66974200 a2=0 a3=7ffd669741ec items=0 ppid=1812 pid=1900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:39.686000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 13 00:50:39.702000 audit[1906]: NETFILTER_CFG table=filter:39 family=2 entries=9 op=nft_register_rule pid=1906 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:50:39.702000 audit[1906]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd99ca7d80 a2=0 a3=7ffd99ca7d6c items=0 ppid=1812 pid=1906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:39.702000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:50:39.718000 audit[1906]: NETFILTER_CFG table=nat:40 family=2 entries=21 op=nft_register_chain pid=1906 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:50:39.718000 audit[1906]: SYSCALL arch=c000003e syscall=46 success=yes exit=9084 a0=3 a1=7ffd99ca7d80 a2=0 a3=7ffd99ca7d6c items=0 ppid=1812 pid=1906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:39.718000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:50:39.719000 audit[1912]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1912 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:50:39.719000 audit[1912]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff01c510e0 a2=0 a3=7fff01c510cc items=0 ppid=1812 pid=1912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:39.719000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 13 00:50:39.721000 audit[1914]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1914 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:50:39.721000 audit[1914]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd8085b8a0 a2=0 a3=7ffd8085b88c items=0 ppid=1812 pid=1914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:39.721000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 13 00:50:39.724000 audit[1917]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1917 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:50:39.724000 audit[1917]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff39028df0 a2=0 a3=7fff39028ddc items=0 ppid=1812 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:39.724000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 13 00:50:39.724000 audit[1918]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1918 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:50:39.724000 audit[1918]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffee555b1e0 a2=0 a3=7ffee555b1cc items=0 ppid=1812 pid=1918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:39.724000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 13 00:50:39.726000 audit[1920]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1920 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:50:39.726000 audit[1920]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc606b5630 a2=0 a3=7ffc606b561c items=0 ppid=1812 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:39.726000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 13 00:50:39.727000 audit[1921]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1921 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:50:39.727000 audit[1921]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd1c9370d0 a2=0 a3=7ffd1c9370bc items=0 ppid=1812 pid=1921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:39.727000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 13 00:50:39.729000 audit[1923]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1923 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:50:39.729000 audit[1923]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff2b1d8200 a2=0 a3=7fff2b1d81ec items=0 ppid=1812 pid=1923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:39.729000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 13 00:50:39.732000 audit[1926]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1926 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:50:39.732000 audit[1926]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fff9baf4c60 a2=0 a3=7fff9baf4c4c items=0 ppid=1812 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:39.732000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 13 00:50:39.732000 audit[1927]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1927 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:50:39.732000 audit[1927]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff0ed24f20 a2=0 a3=7fff0ed24f0c items=0 ppid=1812 pid=1927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:39.732000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 13 00:50:39.734000 audit[1929]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1929 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:50:39.734000 audit[1929]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc841dea00 a2=0 a3=7ffc841de9ec items=0 ppid=1812 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:39.734000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 13 00:50:39.735000 audit[1930]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1930 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:50:39.735000 audit[1930]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd7c7bedf0 a2=0 a3=7ffd7c7beddc items=0 ppid=1812 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:39.735000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 13 00:50:39.737000 audit[1932]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1932 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:50:39.737000 audit[1932]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffea9e57900 a2=0 a3=7ffea9e578ec items=0 ppid=1812 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:39.737000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 13 00:50:39.740000 audit[1935]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1935 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:50:39.740000 audit[1935]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff3e1a83b0 a2=0 a3=7fff3e1a839c items=0 ppid=1812 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:39.740000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 13 00:50:39.742000 audit[1938]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1938 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:50:39.742000 audit[1938]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd25698730 a2=0 a3=7ffd2569871c items=0 ppid=1812 pid=1938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:39.742000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 13 00:50:39.743000 audit[1939]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1939 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:50:39.743000 audit[1939]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc5b620a00 a2=0 a3=7ffc5b6209ec items=0 ppid=1812 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:39.743000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 13 00:50:39.745000 audit[1941]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1941 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:50:39.745000 audit[1941]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd5508b640 a2=0 a3=7ffd5508b62c items=0 ppid=1812 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:39.745000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 00:50:39.747000 audit[1944]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1944 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:50:39.747000 audit[1944]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe06b7b390 a2=0 a3=7ffe06b7b37c items=0 ppid=1812 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:39.747000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 00:50:39.748000 audit[1945]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1945 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:50:39.748000 audit[1945]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe6f82f060 a2=0 a3=7ffe6f82f04c items=0 ppid=1812 pid=1945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:39.748000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 13 00:50:39.750000 audit[1947]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1947 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:50:39.750000 audit[1947]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffec18705c0 a2=0 a3=7ffec18705ac items=0 ppid=1812 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:39.750000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 13 00:50:39.751000 audit[1948]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1948 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:50:39.751000 audit[1948]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd8d007a20 a2=0 a3=7ffd8d007a0c items=0 ppid=1812 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:39.751000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 13 00:50:39.753000 audit[1950]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1950 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:50:39.753000 audit[1950]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdde2ec070 a2=0 a3=7ffdde2ec05c items=0 ppid=1812 pid=1950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:39.753000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 00:50:39.755000 audit[1953]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1953 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:50:39.755000 audit[1953]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff89ab68d0 a2=0 a3=7fff89ab68bc items=0 ppid=1812 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:39.755000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 00:50:39.757000 audit[1955]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1955 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 13 00:50:39.757000 audit[1955]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7fff3c1c2db0 a2=0 a3=7fff3c1c2d9c items=0 ppid=1812 pid=1955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:39.757000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:50:39.758000 audit[1955]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1955 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 13 00:50:39.758000 audit[1955]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fff3c1c2db0 a2=0 a3=7fff3c1c2d9c items=0 ppid=1812 pid=1955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:39.758000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:50:39.777019 kubelet[1596]: E0513 00:50:39.776983 1596 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-jgsmr" podUID="a5a07571-4660-42ee-a93f-618103603d07" May 13 00:50:39.788369 kubelet[1596]: E0513 00:50:39.788349 1596 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:50:39.795197 kubelet[1596]: I0513 00:50:39.795075 1596 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-5pxpg" podStartSLOduration=3.9127963599999998 podStartE2EDuration="7.795056581s" podCreationTimestamp="2025-05-13 00:50:32 +0000 UTC" firstStartedPulling="2025-05-13 00:50:35.546273168 +0000 UTC m=+3.671306282" lastFinishedPulling="2025-05-13 00:50:39.428533368 +0000 UTC m=+7.553566503" observedRunningTime="2025-05-13 00:50:39.794807564 +0000 UTC m=+7.919840688" watchObservedRunningTime="2025-05-13 00:50:39.795056581 +0000 UTC m=+7.920089695" May 13 00:50:40.293161 kubelet[1596]: E0513 00:50:40.293049 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:50:40.789936 kubelet[1596]: E0513 00:50:40.789835 1596 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:50:41.293988 kubelet[1596]: E0513 00:50:41.293956 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:50:41.776742 kubelet[1596]: E0513 00:50:41.776616 1596 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-jgsmr" podUID="a5a07571-4660-42ee-a93f-618103603d07" May 13 00:50:42.294087 kubelet[1596]: E0513 00:50:42.294035 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:50:43.295051 kubelet[1596]: E0513 00:50:43.295025 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:50:43.777218 kubelet[1596]: E0513 00:50:43.777110 1596 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-jgsmr" podUID="a5a07571-4660-42ee-a93f-618103603d07" May 13 00:50:44.295487 kubelet[1596]: E0513 00:50:44.295435 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:50:45.296472 kubelet[1596]: E0513 00:50:45.296430 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:50:45.776885 kubelet[1596]: E0513 00:50:45.776769 1596 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-jgsmr" podUID="a5a07571-4660-42ee-a93f-618103603d07" May 13 00:50:46.297557 kubelet[1596]: E0513 00:50:46.297527 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:50:46.346567 env[1309]: time="2025-05-13T00:50:46.346519393Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:50:46.348191 env[1309]: time="2025-05-13T00:50:46.348162685Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:50:46.351595 env[1309]: time="2025-05-13T00:50:46.351558304Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:50:46.352917 env[1309]: time="2025-05-13T00:50:46.352874543Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:50:46.353265 env[1309]: time="2025-05-13T00:50:46.353234468Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9\"" May 13 00:50:46.354826 env[1309]: time="2025-05-13T00:50:46.354793242Z" level=info msg="CreateContainer within sandbox \"d725a8c0290d342d194b1a63417dbb15c71ad87c7fcf0d7b9d0d3f85ccb6240e\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 13 00:50:46.367716 env[1309]: time="2025-05-13T00:50:46.367664655Z" level=info msg="CreateContainer within sandbox \"d725a8c0290d342d194b1a63417dbb15c71ad87c7fcf0d7b9d0d3f85ccb6240e\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"94802a123bdc1e2440b6b9b591b5afcc3aa65fced6a98d72dfbfba88addc5c10\"" May 13 00:50:46.367985 env[1309]: time="2025-05-13T00:50:46.367960961Z" level=info msg="StartContainer for \"94802a123bdc1e2440b6b9b591b5afcc3aa65fced6a98d72dfbfba88addc5c10\"" May 13 00:50:46.406300 env[1309]: time="2025-05-13T00:50:46.406237687Z" level=info msg="StartContainer for \"94802a123bdc1e2440b6b9b591b5afcc3aa65fced6a98d72dfbfba88addc5c10\" returns successfully" May 13 00:50:46.798839 kubelet[1596]: E0513 00:50:46.798789 1596 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:50:47.298524 kubelet[1596]: E0513 00:50:47.298419 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:50:47.625779 env[1309]: time="2025-05-13T00:50:47.625653803Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 13 00:50:47.641289 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-94802a123bdc1e2440b6b9b591b5afcc3aa65fced6a98d72dfbfba88addc5c10-rootfs.mount: Deactivated successfully. May 13 00:50:47.688358 kubelet[1596]: I0513 00:50:47.688323 1596 kubelet_node_status.go:497] "Fast updating node status as it just became ready" May 13 00:50:47.778996 env[1309]: time="2025-05-13T00:50:47.778939413Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-jgsmr,Uid:a5a07571-4660-42ee-a93f-618103603d07,Namespace:calico-system,Attempt:0,}" May 13 00:50:47.799932 kubelet[1596]: E0513 00:50:47.799902 1596 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:50:48.147779 env[1309]: time="2025-05-13T00:50:48.147726703Z" level=info msg="shim disconnected" id=94802a123bdc1e2440b6b9b591b5afcc3aa65fced6a98d72dfbfba88addc5c10 May 13 00:50:48.147779 env[1309]: time="2025-05-13T00:50:48.147776637Z" level=warning msg="cleaning up after shim disconnected" id=94802a123bdc1e2440b6b9b591b5afcc3aa65fced6a98d72dfbfba88addc5c10 namespace=k8s.io May 13 00:50:48.147779 env[1309]: time="2025-05-13T00:50:48.147785934Z" level=info msg="cleaning up dead shim" May 13 00:50:48.157778 env[1309]: time="2025-05-13T00:50:48.155184341Z" level=warning msg="cleanup warnings time=\"2025-05-13T00:50:48Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2005 runtime=io.containerd.runc.v2\n" May 13 00:50:48.200400 env[1309]: time="2025-05-13T00:50:48.200329901Z" level=error msg="Failed to destroy network for sandbox \"26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:50:48.200703 env[1309]: time="2025-05-13T00:50:48.200666062Z" level=error msg="encountered an error cleaning up failed sandbox \"26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:50:48.200755 env[1309]: time="2025-05-13T00:50:48.200709243Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-jgsmr,Uid:a5a07571-4660-42ee-a93f-618103603d07,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:50:48.201246 kubelet[1596]: E0513 00:50:48.200920 1596 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:50:48.201246 kubelet[1596]: E0513 00:50:48.200995 1596 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-jgsmr" May 13 00:50:48.201246 kubelet[1596]: E0513 00:50:48.201014 1596 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-jgsmr" May 13 00:50:48.201403 kubelet[1596]: E0513 00:50:48.201052 1596 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-jgsmr_calico-system(a5a07571-4660-42ee-a93f-618103603d07)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-jgsmr_calico-system(a5a07571-4660-42ee-a93f-618103603d07)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-jgsmr" podUID="a5a07571-4660-42ee-a93f-618103603d07" May 13 00:50:48.202091 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f-shm.mount: Deactivated successfully. May 13 00:50:48.299275 kubelet[1596]: E0513 00:50:48.299243 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:50:48.802924 kubelet[1596]: E0513 00:50:48.802893 1596 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:50:48.803574 kubelet[1596]: I0513 00:50:48.803544 1596 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f" May 13 00:50:48.803706 env[1309]: time="2025-05-13T00:50:48.803671939Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 13 00:50:48.804048 env[1309]: time="2025-05-13T00:50:48.803995125Z" level=info msg="StopPodSandbox for \"26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f\"" May 13 00:50:48.825060 env[1309]: time="2025-05-13T00:50:48.825003461Z" level=error msg="StopPodSandbox for \"26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f\" failed" error="failed to destroy network for sandbox \"26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:50:48.825265 kubelet[1596]: E0513 00:50:48.825218 1596 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f" May 13 00:50:48.825318 kubelet[1596]: E0513 00:50:48.825278 1596 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f"} May 13 00:50:48.825345 kubelet[1596]: E0513 00:50:48.825335 1596 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a5a07571-4660-42ee-a93f-618103603d07\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:50:48.825409 kubelet[1596]: E0513 00:50:48.825360 1596 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a5a07571-4660-42ee-a93f-618103603d07\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-jgsmr" podUID="a5a07571-4660-42ee-a93f-618103603d07" May 13 00:50:49.299712 kubelet[1596]: E0513 00:50:49.299593 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:50:49.639391 kubelet[1596]: I0513 00:50:49.639263 1596 topology_manager.go:215] "Topology Admit Handler" podUID="f5ee848a-452f-46a5-af6c-814792531001" podNamespace="default" podName="nginx-deployment-85f456d6dd-jppp2" May 13 00:50:49.707951 kubelet[1596]: I0513 00:50:49.707918 1596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-w572v\" (UniqueName: \"kubernetes.io/projected/f5ee848a-452f-46a5-af6c-814792531001-kube-api-access-w572v\") pod \"nginx-deployment-85f456d6dd-jppp2\" (UID: \"f5ee848a-452f-46a5-af6c-814792531001\") " pod="default/nginx-deployment-85f456d6dd-jppp2" May 13 00:50:49.942709 env[1309]: time="2025-05-13T00:50:49.942602697Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-jppp2,Uid:f5ee848a-452f-46a5-af6c-814792531001,Namespace:default,Attempt:0,}" May 13 00:50:49.993855 env[1309]: time="2025-05-13T00:50:49.993771034Z" level=error msg="Failed to destroy network for sandbox \"dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:50:49.994154 env[1309]: time="2025-05-13T00:50:49.994120700Z" level=error msg="encountered an error cleaning up failed sandbox \"dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:50:49.994189 env[1309]: time="2025-05-13T00:50:49.994167208Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-jppp2,Uid:f5ee848a-452f-46a5-af6c-814792531001,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:50:49.994432 kubelet[1596]: E0513 00:50:49.994387 1596 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:50:49.994591 kubelet[1596]: E0513 00:50:49.994447 1596 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-jppp2" May 13 00:50:49.994591 kubelet[1596]: E0513 00:50:49.994469 1596 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-jppp2" May 13 00:50:49.994591 kubelet[1596]: E0513 00:50:49.994512 1596 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-85f456d6dd-jppp2_default(f5ee848a-452f-46a5-af6c-814792531001)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-85f456d6dd-jppp2_default(f5ee848a-452f-46a5-af6c-814792531001)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-jppp2" podUID="f5ee848a-452f-46a5-af6c-814792531001" May 13 00:50:49.995325 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0-shm.mount: Deactivated successfully. May 13 00:50:50.300697 kubelet[1596]: E0513 00:50:50.300619 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:50:50.807135 kubelet[1596]: I0513 00:50:50.807106 1596 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0" May 13 00:50:50.807589 env[1309]: time="2025-05-13T00:50:50.807555421Z" level=info msg="StopPodSandbox for \"dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0\"" May 13 00:50:50.829713 env[1309]: time="2025-05-13T00:50:50.829665233Z" level=error msg="StopPodSandbox for \"dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0\" failed" error="failed to destroy network for sandbox \"dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:50:50.829895 kubelet[1596]: E0513 00:50:50.829860 1596 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0" May 13 00:50:50.829960 kubelet[1596]: E0513 00:50:50.829901 1596 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0"} May 13 00:50:50.829960 kubelet[1596]: E0513 00:50:50.829937 1596 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f5ee848a-452f-46a5-af6c-814792531001\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:50:50.830045 kubelet[1596]: E0513 00:50:50.829959 1596 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f5ee848a-452f-46a5-af6c-814792531001\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-jppp2" podUID="f5ee848a-452f-46a5-af6c-814792531001" May 13 00:50:51.301653 kubelet[1596]: E0513 00:50:51.301535 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:50:52.286400 kubelet[1596]: E0513 00:50:52.286342 1596 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:50:52.301810 kubelet[1596]: E0513 00:50:52.301771 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:50:53.301896 kubelet[1596]: E0513 00:50:53.301852 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:50:54.302655 kubelet[1596]: E0513 00:50:54.302608 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:50:55.303686 kubelet[1596]: E0513 00:50:55.303635 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:50:55.400120 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3800910890.mount: Deactivated successfully. May 13 00:50:56.304393 kubelet[1596]: E0513 00:50:56.304324 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:50:56.399440 env[1309]: time="2025-05-13T00:50:56.399392850Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:50:56.401367 env[1309]: time="2025-05-13T00:50:56.401345473Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:50:56.402972 env[1309]: time="2025-05-13T00:50:56.402944322Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:50:56.404451 env[1309]: time="2025-05-13T00:50:56.404407636Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:50:56.404681 env[1309]: time="2025-05-13T00:50:56.404657034Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae\"" May 13 00:50:56.409906 env[1309]: time="2025-05-13T00:50:56.409878448Z" level=info msg="CreateContainer within sandbox \"d725a8c0290d342d194b1a63417dbb15c71ad87c7fcf0d7b9d0d3f85ccb6240e\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 13 00:50:56.423967 env[1309]: time="2025-05-13T00:50:56.423933080Z" level=info msg="CreateContainer within sandbox \"d725a8c0290d342d194b1a63417dbb15c71ad87c7fcf0d7b9d0d3f85ccb6240e\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"64f8a8c6052abba41452941546f095ddffd80f374dae982e6c9674e9ba4565e3\"" May 13 00:50:56.424367 env[1309]: time="2025-05-13T00:50:56.424347398Z" level=info msg="StartContainer for \"64f8a8c6052abba41452941546f095ddffd80f374dae982e6c9674e9ba4565e3\"" May 13 00:50:56.463630 env[1309]: time="2025-05-13T00:50:56.463584946Z" level=info msg="StartContainer for \"64f8a8c6052abba41452941546f095ddffd80f374dae982e6c9674e9ba4565e3\" returns successfully" May 13 00:50:56.522881 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 13 00:50:56.522995 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 13 00:50:56.816311 kubelet[1596]: E0513 00:50:56.816273 1596 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:50:56.827779 kubelet[1596]: I0513 00:50:56.827726 1596 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-rjbjt" podStartSLOduration=3.959593299 podStartE2EDuration="24.827707867s" podCreationTimestamp="2025-05-13 00:50:32 +0000 UTC" firstStartedPulling="2025-05-13 00:50:35.537258379 +0000 UTC m=+3.662291483" lastFinishedPulling="2025-05-13 00:50:56.405372937 +0000 UTC m=+24.530406051" observedRunningTime="2025-05-13 00:50:56.827103022 +0000 UTC m=+24.952136126" watchObservedRunningTime="2025-05-13 00:50:56.827707867 +0000 UTC m=+24.952740981" May 13 00:50:57.305476 kubelet[1596]: E0513 00:50:57.305359 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:50:57.321000 audit[2229]: NETFILTER_CFG table=filter:65 family=2 entries=16 op=nft_register_rule pid=2229 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:50:57.323137 kernel: kauditd_printk_skb: 143 callbacks suppressed May 13 00:50:57.323187 kernel: audit: type=1325 audit(1747097457.321:235): table=filter:65 family=2 entries=16 op=nft_register_rule pid=2229 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:50:57.321000 audit[2229]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffee0e9c4a0 a2=0 a3=7ffee0e9c48c items=0 ppid=1812 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.330727 kernel: audit: type=1300 audit(1747097457.321:235): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffee0e9c4a0 a2=0 a3=7ffee0e9c48c items=0 ppid=1812 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.330776 kernel: audit: type=1327 audit(1747097457.321:235): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:50:57.321000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:50:57.337000 audit[2229]: NETFILTER_CFG table=nat:66 family=2 entries=14 op=nft_register_rule pid=2229 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:50:57.337000 audit[2229]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffee0e9c4a0 a2=0 a3=0 items=0 ppid=1812 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.344957 kernel: audit: type=1325 audit(1747097457.337:236): table=nat:66 family=2 entries=14 op=nft_register_rule pid=2229 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:50:57.345001 kernel: audit: type=1300 audit(1747097457.337:236): arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffee0e9c4a0 a2=0 a3=0 items=0 ppid=1812 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.345020 kernel: audit: type=1327 audit(1747097457.337:236): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:50:57.337000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:50:57.351000 audit[2231]: NETFILTER_CFG table=filter:67 family=2 entries=13 op=nft_register_rule pid=2231 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:50:57.351000 audit[2231]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc6e838210 a2=0 a3=7ffc6e8381fc items=0 ppid=1812 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.359432 kernel: audit: type=1325 audit(1747097457.351:237): table=filter:67 family=2 entries=13 op=nft_register_rule pid=2231 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:50:57.359476 kernel: audit: type=1300 audit(1747097457.351:237): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc6e838210 a2=0 a3=7ffc6e8381fc items=0 ppid=1812 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.359497 kernel: audit: type=1327 audit(1747097457.351:237): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:50:57.351000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:50:57.366000 audit[2231]: NETFILTER_CFG table=nat:68 family=2 entries=35 op=nft_register_chain pid=2231 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:50:57.366000 audit[2231]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffc6e838210 a2=0 a3=7ffc6e8381fc items=0 ppid=1812 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.369832 kernel: audit: type=1325 audit(1747097457.366:238): table=nat:68 family=2 entries=35 op=nft_register_chain pid=2231 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:50:57.366000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:50:57.698000 audit[2274]: AVC avc: denied { write } for pid=2274 comm="tee" name="fd" dev="proc" ino=17337 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:50:57.698000 audit[2274]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffed4369a1e a2=241 a3=1b6 items=1 ppid=2242 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.698000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 13 00:50:57.698000 audit: PATH item=0 name="/dev/fd/63" inode=17329 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:57.698000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:50:57.701000 audit[2285]: AVC avc: denied { write } for pid=2285 comm="tee" name="fd" dev="proc" ino=20159 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:50:57.701000 audit[2285]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffe219fa2d a2=241 a3=1b6 items=1 ppid=2252 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.701000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 13 00:50:57.701000 audit: PATH item=0 name="/dev/fd/63" inode=17341 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:57.701000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:50:57.702000 audit[2280]: AVC avc: denied { write } for pid=2280 comm="tee" name="fd" dev="proc" ino=20163 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:50:57.702000 audit[2280]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff7d3a3a2d a2=241 a3=1b6 items=1 ppid=2243 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.702000 audit: CWD cwd="/etc/service/enabled/confd/log" May 13 00:50:57.702000 audit: PATH item=0 name="/dev/fd/63" inode=17334 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:57.702000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:50:57.707000 audit[2292]: AVC avc: denied { write } for pid=2292 comm="tee" name="fd" dev="proc" ino=20173 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:50:57.707000 audit[2292]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe7cfaaa2f a2=241 a3=1b6 items=1 ppid=2261 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.707000 audit: CWD cwd="/etc/service/enabled/cni/log" May 13 00:50:57.707000 audit: PATH item=0 name="/dev/fd/63" inode=17344 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:57.707000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:50:57.714000 audit[2276]: AVC avc: denied { write } for pid=2276 comm="tee" name="fd" dev="proc" ino=19093 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:50:57.714000 audit[2276]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe784c5a2e a2=241 a3=1b6 items=1 ppid=2244 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.714000 audit: CWD cwd="/etc/service/enabled/bird/log" May 13 00:50:57.714000 audit: PATH item=0 name="/dev/fd/63" inode=20152 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:57.714000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:50:57.719000 audit[2306]: AVC avc: denied { write } for pid=2306 comm="tee" name="fd" dev="proc" ino=17354 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:50:57.719000 audit[2306]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd81800a1d a2=241 a3=1b6 items=1 ppid=2248 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.719000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 13 00:50:57.719000 audit: PATH item=0 name="/dev/fd/63" inode=19087 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:57.719000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:50:57.721000 audit[2319]: AVC avc: denied { write } for pid=2319 comm="tee" name="fd" dev="proc" ino=19097 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:50:57.721000 audit[2319]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc4a5a6a2d a2=241 a3=1b6 items=1 ppid=2253 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.721000 audit: CWD cwd="/etc/service/enabled/felix/log" May 13 00:50:57.721000 audit: PATH item=0 name="/dev/fd/63" inode=19089 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:50:57.721000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:50:57.788000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.788000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.788000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.788000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.788000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.788000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.788000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.788000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.788000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.788000 audit: BPF prog-id=10 op=LOAD May 13 00:50:57.788000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff442db7b0 a2=98 a3=3 items=0 ppid=2257 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.788000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:50:57.788000 audit: BPF prog-id=10 op=UNLOAD May 13 00:50:57.789000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.789000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.789000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.789000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.789000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.789000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.789000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.789000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.789000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.789000 audit: BPF prog-id=11 op=LOAD May 13 00:50:57.789000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff442db590 a2=74 a3=540051 items=0 ppid=2257 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.789000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:50:57.789000 audit: BPF prog-id=11 op=UNLOAD May 13 00:50:57.789000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.789000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.789000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.789000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.789000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.789000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.789000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.789000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.789000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.789000 audit: BPF prog-id=12 op=LOAD May 13 00:50:57.789000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff442db5c0 a2=94 a3=2 items=0 ppid=2257 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.789000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:50:57.790000 audit: BPF prog-id=12 op=UNLOAD May 13 00:50:57.817964 kubelet[1596]: E0513 00:50:57.817839 1596 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:50:57.892000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.892000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.892000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.892000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.892000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.892000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.892000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.892000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.892000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.892000 audit: BPF prog-id=13 op=LOAD May 13 00:50:57.892000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff442db480 a2=40 a3=1 items=0 ppid=2257 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.892000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:50:57.892000 audit: BPF prog-id=13 op=UNLOAD May 13 00:50:57.892000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.892000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff442db550 a2=50 a3=7fff442db630 items=0 ppid=2257 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.892000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:50:57.900000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.900000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff442db490 a2=28 a3=0 items=0 ppid=2257 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.900000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:50:57.900000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.900000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff442db4c0 a2=28 a3=0 items=0 ppid=2257 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.900000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:50:57.900000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.900000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff442db3d0 a2=28 a3=0 items=0 ppid=2257 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.900000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:50:57.900000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.900000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff442db4e0 a2=28 a3=0 items=0 ppid=2257 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.900000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:50:57.900000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.900000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff442db4c0 a2=28 a3=0 items=0 ppid=2257 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.900000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:50:57.900000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.900000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff442db4b0 a2=28 a3=0 items=0 ppid=2257 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.900000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:50:57.900000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.900000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff442db4e0 a2=28 a3=0 items=0 ppid=2257 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.900000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:50:57.900000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.900000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff442db4c0 a2=28 a3=0 items=0 ppid=2257 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.900000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:50:57.900000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.900000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff442db4e0 a2=28 a3=0 items=0 ppid=2257 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.900000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:50:57.900000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.900000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff442db4b0 a2=28 a3=0 items=0 ppid=2257 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.900000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:50:57.900000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.900000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff442db520 a2=28 a3=0 items=0 ppid=2257 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.900000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:50:57.900000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.900000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff442db2d0 a2=50 a3=1 items=0 ppid=2257 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.900000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:50:57.900000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.900000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.900000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.900000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.900000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.900000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.900000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.900000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.900000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.900000 audit: BPF prog-id=14 op=LOAD May 13 00:50:57.900000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff442db2d0 a2=94 a3=5 items=0 ppid=2257 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.900000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:50:57.900000 audit: BPF prog-id=14 op=UNLOAD May 13 00:50:57.900000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.900000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff442db380 a2=50 a3=1 items=0 ppid=2257 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.900000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:50:57.900000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.900000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff442db4a0 a2=4 a3=38 items=0 ppid=2257 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.900000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:50:57.900000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.900000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.900000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.900000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.900000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.900000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.900000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.900000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.900000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.900000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.900000 audit[2362]: AVC avc: denied { confidentiality } for pid=2362 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:50:57.900000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff442db4f0 a2=94 a3=6 items=0 ppid=2257 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.900000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:50:57.900000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.900000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.900000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.900000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.900000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.900000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.900000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.900000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.900000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.900000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.900000 audit[2362]: AVC avc: denied { confidentiality } for pid=2362 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:50:57.900000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff442daca0 a2=94 a3=83 items=0 ppid=2257 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.900000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:50:57.901000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.901000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.901000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.901000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.901000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.901000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.901000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.901000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.901000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.901000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.901000 audit[2362]: AVC avc: denied { confidentiality } for pid=2362 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:50:57.901000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff442daca0 a2=94 a3=83 items=0 ppid=2257 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.901000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:50:57.907000 audit[2389]: AVC avc: denied { bpf } for pid=2389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.907000 audit[2389]: AVC avc: denied { bpf } for pid=2389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.907000 audit[2389]: AVC avc: denied { perfmon } for pid=2389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.907000 audit[2389]: AVC avc: denied { perfmon } for pid=2389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.907000 audit[2389]: AVC avc: denied { perfmon } for pid=2389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.907000 audit[2389]: AVC avc: denied { perfmon } for pid=2389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.907000 audit[2389]: AVC avc: denied { perfmon } for pid=2389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.907000 audit[2389]: AVC avc: denied { bpf } for pid=2389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.907000 audit[2389]: AVC avc: denied { bpf } for pid=2389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.907000 audit: BPF prog-id=15 op=LOAD May 13 00:50:57.907000 audit[2389]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc4dcb5ab0 a2=98 a3=1999999999999999 items=0 ppid=2257 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.907000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 13 00:50:57.907000 audit: BPF prog-id=15 op=UNLOAD May 13 00:50:57.907000 audit[2389]: AVC avc: denied { bpf } for pid=2389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.907000 audit[2389]: AVC avc: denied { bpf } for pid=2389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.907000 audit[2389]: AVC avc: denied { perfmon } for pid=2389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.907000 audit[2389]: AVC avc: denied { perfmon } for pid=2389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.907000 audit[2389]: AVC avc: denied { perfmon } for pid=2389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.907000 audit[2389]: AVC avc: denied { perfmon } for pid=2389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.907000 audit[2389]: AVC avc: denied { perfmon } for pid=2389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.907000 audit[2389]: AVC avc: denied { bpf } for pid=2389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.907000 audit[2389]: AVC avc: denied { bpf } for pid=2389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.907000 audit: BPF prog-id=16 op=LOAD May 13 00:50:57.907000 audit[2389]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc4dcb5990 a2=74 a3=ffff items=0 ppid=2257 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.907000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 13 00:50:57.907000 audit: BPF prog-id=16 op=UNLOAD May 13 00:50:57.907000 audit[2389]: AVC avc: denied { bpf } for pid=2389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.907000 audit[2389]: AVC avc: denied { bpf } for pid=2389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.907000 audit[2389]: AVC avc: denied { perfmon } for pid=2389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.907000 audit[2389]: AVC avc: denied { perfmon } for pid=2389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.907000 audit[2389]: AVC avc: denied { perfmon } for pid=2389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.907000 audit[2389]: AVC avc: denied { perfmon } for pid=2389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.907000 audit[2389]: AVC avc: denied { perfmon } for pid=2389 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.907000 audit[2389]: AVC avc: denied { bpf } for pid=2389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.907000 audit[2389]: AVC avc: denied { bpf } for pid=2389 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.907000 audit: BPF prog-id=17 op=LOAD May 13 00:50:57.907000 audit[2389]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc4dcb59d0 a2=40 a3=7ffc4dcb5bb0 items=0 ppid=2257 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.907000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 13 00:50:57.907000 audit: BPF prog-id=17 op=UNLOAD May 13 00:50:57.942867 systemd-networkd[1084]: vxlan.calico: Link UP May 13 00:50:57.942873 systemd-networkd[1084]: vxlan.calico: Gained carrier May 13 00:50:57.963000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.963000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.963000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.963000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.963000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.963000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.963000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.963000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.963000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.963000 audit: BPF prog-id=18 op=LOAD May 13 00:50:57.963000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffefb07b00 a2=98 a3=ffffffff items=0 ppid=2257 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.963000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:50:57.964000 audit: BPF prog-id=18 op=UNLOAD May 13 00:50:57.964000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.964000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.964000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.964000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.964000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.964000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.964000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.964000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.964000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.964000 audit: BPF prog-id=19 op=LOAD May 13 00:50:57.964000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffefb07910 a2=74 a3=540051 items=0 ppid=2257 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.964000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:50:57.964000 audit: BPF prog-id=19 op=UNLOAD May 13 00:50:57.964000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.964000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.964000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.964000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.964000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.964000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.964000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.964000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.964000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.964000 audit: BPF prog-id=20 op=LOAD May 13 00:50:57.964000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffefb07940 a2=94 a3=2 items=0 ppid=2257 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.964000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:50:57.964000 audit: BPF prog-id=20 op=UNLOAD May 13 00:50:57.964000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.964000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffefb07810 a2=28 a3=0 items=0 ppid=2257 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.964000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:50:57.964000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.964000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffefb07840 a2=28 a3=0 items=0 ppid=2257 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.964000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:50:57.964000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.964000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffefb07750 a2=28 a3=0 items=0 ppid=2257 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.964000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:50:57.964000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.964000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffefb07860 a2=28 a3=0 items=0 ppid=2257 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.964000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:50:57.964000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.964000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffefb07840 a2=28 a3=0 items=0 ppid=2257 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.964000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:50:57.964000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.964000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffefb07830 a2=28 a3=0 items=0 ppid=2257 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.964000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:50:57.964000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.964000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffefb07860 a2=28 a3=0 items=0 ppid=2257 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.964000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:50:57.964000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.964000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffefb07840 a2=28 a3=0 items=0 ppid=2257 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.964000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:50:57.964000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.964000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffefb07860 a2=28 a3=0 items=0 ppid=2257 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.964000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:50:57.964000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.964000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffefb07830 a2=28 a3=0 items=0 ppid=2257 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.964000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:50:57.964000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.964000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffefb078a0 a2=28 a3=0 items=0 ppid=2257 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.964000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:50:57.964000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.964000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.964000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.964000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.964000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.964000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.964000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.964000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.964000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.964000 audit: BPF prog-id=21 op=LOAD May 13 00:50:57.964000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffefb07710 a2=40 a3=0 items=0 ppid=2257 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.964000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:50:57.964000 audit: BPF prog-id=21 op=UNLOAD May 13 00:50:57.964000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.964000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fffefb07700 a2=50 a3=2800 items=0 ppid=2257 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.964000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:50:57.964000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.964000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fffefb07700 a2=50 a3=2800 items=0 ppid=2257 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.964000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:50:57.964000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.964000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.964000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.964000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.964000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.964000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.964000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.964000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.964000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.964000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.964000 audit: BPF prog-id=22 op=LOAD May 13 00:50:57.964000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffefb06f20 a2=94 a3=2 items=0 ppid=2257 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.964000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:50:57.965000 audit: BPF prog-id=22 op=UNLOAD May 13 00:50:57.965000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.965000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.965000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.965000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.965000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.965000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.965000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.965000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.965000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.965000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.965000 audit: BPF prog-id=23 op=LOAD May 13 00:50:57.965000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffefb07020 a2=94 a3=30 items=0 ppid=2257 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.965000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:50:57.966000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.966000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.966000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.966000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.966000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.966000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.966000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.966000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.966000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.966000 audit: BPF prog-id=24 op=LOAD May 13 00:50:57.966000 audit[2420]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdaadf55c0 a2=98 a3=0 items=0 ppid=2257 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.966000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:50:57.966000 audit: BPF prog-id=24 op=UNLOAD May 13 00:50:57.967000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.967000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.967000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.967000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.967000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.967000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.967000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.967000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.967000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.967000 audit: BPF prog-id=25 op=LOAD May 13 00:50:57.967000 audit[2420]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdaadf53a0 a2=74 a3=540051 items=0 ppid=2257 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.967000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:50:57.967000 audit: BPF prog-id=25 op=UNLOAD May 13 00:50:57.967000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.967000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.967000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.967000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.967000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.967000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.967000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.967000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.967000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:57.967000 audit: BPF prog-id=26 op=LOAD May 13 00:50:57.967000 audit[2420]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdaadf53d0 a2=94 a3=2 items=0 ppid=2257 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.967000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:50:57.967000 audit: BPF prog-id=26 op=UNLOAD May 13 00:50:58.069000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.069000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.069000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.069000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.069000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.069000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.069000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.069000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.069000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.069000 audit: BPF prog-id=27 op=LOAD May 13 00:50:58.069000 audit[2420]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdaadf5290 a2=40 a3=1 items=0 ppid=2257 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:58.069000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:50:58.069000 audit: BPF prog-id=27 op=UNLOAD May 13 00:50:58.069000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.069000 audit[2420]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffdaadf5360 a2=50 a3=7ffdaadf5440 items=0 ppid=2257 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:58.069000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:50:58.076000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.076000 audit[2420]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdaadf52a0 a2=28 a3=0 items=0 ppid=2257 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:58.076000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:50:58.076000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.076000 audit[2420]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdaadf52d0 a2=28 a3=0 items=0 ppid=2257 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:58.076000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:50:58.076000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.076000 audit[2420]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdaadf51e0 a2=28 a3=0 items=0 ppid=2257 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:58.076000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:50:58.076000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.076000 audit[2420]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdaadf52f0 a2=28 a3=0 items=0 ppid=2257 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:58.076000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:50:58.076000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.076000 audit[2420]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdaadf52d0 a2=28 a3=0 items=0 ppid=2257 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:58.076000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:50:58.076000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.076000 audit[2420]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdaadf52c0 a2=28 a3=0 items=0 ppid=2257 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:58.076000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:50:58.076000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.076000 audit[2420]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdaadf52f0 a2=28 a3=0 items=0 ppid=2257 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:58.076000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:50:58.076000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.076000 audit[2420]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdaadf52d0 a2=28 a3=0 items=0 ppid=2257 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:58.076000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:50:58.076000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.076000 audit[2420]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdaadf52f0 a2=28 a3=0 items=0 ppid=2257 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:58.076000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:50:58.076000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.076000 audit[2420]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdaadf52c0 a2=28 a3=0 items=0 ppid=2257 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:58.076000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:50:58.076000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.076000 audit[2420]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdaadf5330 a2=28 a3=0 items=0 ppid=2257 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:58.076000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:50:58.076000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.076000 audit[2420]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdaadf50e0 a2=50 a3=1 items=0 ppid=2257 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:58.076000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:50:58.076000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.076000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.076000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.076000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.076000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.076000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.076000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.076000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.076000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.076000 audit: BPF prog-id=28 op=LOAD May 13 00:50:58.076000 audit[2420]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdaadf50e0 a2=94 a3=5 items=0 ppid=2257 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:58.076000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:50:58.076000 audit: BPF prog-id=28 op=UNLOAD May 13 00:50:58.076000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.076000 audit[2420]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdaadf5190 a2=50 a3=1 items=0 ppid=2257 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:58.076000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:50:58.076000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.076000 audit[2420]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffdaadf52b0 a2=4 a3=38 items=0 ppid=2257 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:58.076000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:50:58.076000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.076000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.076000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.076000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.076000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.076000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.076000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.076000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.076000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.076000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.076000 audit[2420]: AVC avc: denied { confidentiality } for pid=2420 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:50:58.076000 audit[2420]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdaadf5300 a2=94 a3=6 items=0 ppid=2257 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:58.076000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:50:58.076000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.076000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.076000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.076000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.076000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.076000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.076000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.076000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.076000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.076000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.076000 audit[2420]: AVC avc: denied { confidentiality } for pid=2420 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:50:58.076000 audit[2420]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdaadf4ab0 a2=94 a3=83 items=0 ppid=2257 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:58.076000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:50:58.077000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.077000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.077000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.077000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.077000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.077000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.077000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.077000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.077000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.077000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.077000 audit[2420]: AVC avc: denied { confidentiality } for pid=2420 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:50:58.077000 audit[2420]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdaadf4ab0 a2=94 a3=83 items=0 ppid=2257 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:58.077000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:50:58.077000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.077000 audit[2420]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdaadf64f0 a2=10 a3=208 items=0 ppid=2257 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:58.077000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:50:58.077000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.077000 audit[2420]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdaadf6390 a2=10 a3=3 items=0 ppid=2257 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:58.077000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:50:58.077000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.077000 audit[2420]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdaadf6330 a2=10 a3=3 items=0 ppid=2257 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:58.077000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:50:58.077000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:58.077000 audit[2420]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdaadf6330 a2=10 a3=7 items=0 ppid=2257 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:58.077000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:50:58.086000 audit: BPF prog-id=23 op=UNLOAD May 13 00:50:58.116000 audit[2447]: NETFILTER_CFG table=mangle:69 family=2 entries=16 op=nft_register_chain pid=2447 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:50:58.116000 audit[2447]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffda3d8f3e0 a2=0 a3=7ffda3d8f3cc items=0 ppid=2257 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:58.116000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:50:58.122000 audit[2449]: NETFILTER_CFG table=nat:70 family=2 entries=15 op=nft_register_chain pid=2449 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:50:58.122000 audit[2449]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffc94f672e0 a2=0 a3=7ffc94f672cc items=0 ppid=2257 pid=2449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:58.122000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:50:58.122000 audit[2450]: NETFILTER_CFG table=filter:71 family=2 entries=39 op=nft_register_chain pid=2450 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:50:58.122000 audit[2450]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffc69351b40 a2=0 a3=7ffc69351b2c items=0 ppid=2257 pid=2450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:58.122000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:50:58.124000 audit[2446]: NETFILTER_CFG table=raw:72 family=2 entries=21 op=nft_register_chain pid=2446 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:50:58.124000 audit[2446]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffc48815eb0 a2=0 a3=7ffc48815e9c items=0 ppid=2257 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:58.124000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:50:58.305794 kubelet[1596]: E0513 00:50:58.305710 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:50:59.235960 systemd-networkd[1084]: vxlan.calico: Gained IPv6LL May 13 00:50:59.306561 kubelet[1596]: E0513 00:50:59.306528 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:50:59.337000 audit[2459]: NETFILTER_CFG table=filter:73 family=2 entries=10 op=nft_register_rule pid=2459 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:50:59.337000 audit[2459]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc44300160 a2=0 a3=7ffc4430014c items=0 ppid=1812 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:59.337000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:50:59.344000 audit[2459]: NETFILTER_CFG table=nat:74 family=2 entries=44 op=nft_register_rule pid=2459 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:50:59.344000 audit[2459]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffc44300160 a2=0 a3=7ffc4430014c items=0 ppid=1812 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:59.344000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:50:59.357000 audit[2461]: NETFILTER_CFG table=filter:75 family=2 entries=10 op=nft_register_rule pid=2461 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:50:59.357000 audit[2461]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff9cc8ba70 a2=0 a3=7fff9cc8ba5c items=0 ppid=1812 pid=2461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:59.357000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:50:59.366000 audit[2461]: NETFILTER_CFG table=nat:76 family=2 entries=56 op=nft_register_chain pid=2461 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:50:59.366000 audit[2461]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7fff9cc8ba70 a2=0 a3=7fff9cc8ba5c items=0 ppid=1812 pid=2461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:59.366000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:51:00.307265 kubelet[1596]: E0513 00:51:00.307227 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:51:00.639000 audit[2466]: NETFILTER_CFG table=filter:77 family=2 entries=10 op=nft_register_rule pid=2466 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:51:00.639000 audit[2466]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffed1ed58b0 a2=0 a3=7ffed1ed589c items=0 ppid=1812 pid=2466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:51:00.639000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:51:00.644000 audit[2466]: NETFILTER_CFG table=nat:78 family=2 entries=20 op=nft_register_rule pid=2466 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:51:00.644000 audit[2466]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffed1ed58b0 a2=0 a3=7ffed1ed589c items=0 ppid=1812 pid=2466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:51:00.644000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:51:01.307864 kubelet[1596]: E0513 00:51:01.307836 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:51:01.658000 audit[2468]: NETFILTER_CFG table=filter:79 family=2 entries=9 op=nft_register_rule pid=2468 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:51:01.658000 audit[2468]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc236578a0 a2=0 a3=7ffc2365788c items=0 ppid=1812 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:51:01.658000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:51:01.665000 audit[2468]: NETFILTER_CFG table=nat:80 family=2 entries=27 op=nft_register_chain pid=2468 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:51:01.665000 audit[2468]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffc236578a0 a2=0 a3=7ffc2365788c items=0 ppid=1812 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:51:01.665000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:51:01.777245 env[1309]: time="2025-05-13T00:51:01.777208865Z" level=info msg="StopPodSandbox for \"dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0\"" May 13 00:51:02.308502 kubelet[1596]: E0513 00:51:02.308462 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:51:02.432301 env[1309]: 2025-05-13 00:51:02.404 [INFO][2485] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0" May 13 00:51:02.432301 env[1309]: 2025-05-13 00:51:02.404 [INFO][2485] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0" iface="eth0" netns="/var/run/netns/cni-c4294cc8-c003-87af-7c84-9d43d413fbc9" May 13 00:51:02.432301 env[1309]: 2025-05-13 00:51:02.405 [INFO][2485] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0" iface="eth0" netns="/var/run/netns/cni-c4294cc8-c003-87af-7c84-9d43d413fbc9" May 13 00:51:02.432301 env[1309]: 2025-05-13 00:51:02.405 [INFO][2485] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0" iface="eth0" netns="/var/run/netns/cni-c4294cc8-c003-87af-7c84-9d43d413fbc9" May 13 00:51:02.432301 env[1309]: 2025-05-13 00:51:02.405 [INFO][2485] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0" May 13 00:51:02.432301 env[1309]: 2025-05-13 00:51:02.405 [INFO][2485] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0" May 13 00:51:02.432301 env[1309]: 2025-05-13 00:51:02.423 [INFO][2493] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0" HandleID="k8s-pod-network.dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0" Workload="10.0.0.142-k8s-nginx--deployment--85f456d6dd--jppp2-eth0" May 13 00:51:02.432301 env[1309]: 2025-05-13 00:51:02.423 [INFO][2493] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:51:02.432301 env[1309]: 2025-05-13 00:51:02.423 [INFO][2493] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:51:02.432301 env[1309]: 2025-05-13 00:51:02.428 [WARNING][2493] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0" HandleID="k8s-pod-network.dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0" Workload="10.0.0.142-k8s-nginx--deployment--85f456d6dd--jppp2-eth0" May 13 00:51:02.432301 env[1309]: 2025-05-13 00:51:02.428 [INFO][2493] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0" HandleID="k8s-pod-network.dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0" Workload="10.0.0.142-k8s-nginx--deployment--85f456d6dd--jppp2-eth0" May 13 00:51:02.432301 env[1309]: 2025-05-13 00:51:02.429 [INFO][2493] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:51:02.432301 env[1309]: 2025-05-13 00:51:02.431 [INFO][2485] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0" May 13 00:51:02.432768 env[1309]: time="2025-05-13T00:51:02.432506651Z" level=info msg="TearDown network for sandbox \"dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0\" successfully" May 13 00:51:02.432768 env[1309]: time="2025-05-13T00:51:02.432544133Z" level=info msg="StopPodSandbox for \"dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0\" returns successfully" May 13 00:51:02.433250 env[1309]: time="2025-05-13T00:51:02.433218387Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-jppp2,Uid:f5ee848a-452f-46a5-af6c-814792531001,Namespace:default,Attempt:1,}" May 13 00:51:02.434264 systemd[1]: run-netns-cni\x2dc4294cc8\x2dc003\x2d87af\x2d7c84\x2d9d43d413fbc9.mount: Deactivated successfully. May 13 00:51:02.524247 systemd-networkd[1084]: caliab46855d29e: Link UP May 13 00:51:02.526565 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 13 00:51:02.526618 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliab46855d29e: link becomes ready May 13 00:51:02.526851 systemd-networkd[1084]: caliab46855d29e: Gained carrier May 13 00:51:02.540133 env[1309]: 2025-05-13 00:51:02.474 [INFO][2501] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.142-k8s-nginx--deployment--85f456d6dd--jppp2-eth0 nginx-deployment-85f456d6dd- default f5ee848a-452f-46a5-af6c-814792531001 1024 0 2025-05-13 00:50:49 +0000 UTC map[app:nginx pod-template-hash:85f456d6dd projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.142 nginx-deployment-85f456d6dd-jppp2 eth0 default [] [] [kns.default ksa.default.default] caliab46855d29e [] []}} ContainerID="d9522d2ed99dc4f0e07e48778d56d3e8f5d6bd76298e9e0c8cf018dfe636ea38" Namespace="default" Pod="nginx-deployment-85f456d6dd-jppp2" WorkloadEndpoint="10.0.0.142-k8s-nginx--deployment--85f456d6dd--jppp2-" May 13 00:51:02.540133 env[1309]: 2025-05-13 00:51:02.474 [INFO][2501] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="d9522d2ed99dc4f0e07e48778d56d3e8f5d6bd76298e9e0c8cf018dfe636ea38" Namespace="default" Pod="nginx-deployment-85f456d6dd-jppp2" WorkloadEndpoint="10.0.0.142-k8s-nginx--deployment--85f456d6dd--jppp2-eth0" May 13 00:51:02.540133 env[1309]: 2025-05-13 00:51:02.495 [INFO][2516] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d9522d2ed99dc4f0e07e48778d56d3e8f5d6bd76298e9e0c8cf018dfe636ea38" HandleID="k8s-pod-network.d9522d2ed99dc4f0e07e48778d56d3e8f5d6bd76298e9e0c8cf018dfe636ea38" Workload="10.0.0.142-k8s-nginx--deployment--85f456d6dd--jppp2-eth0" May 13 00:51:02.540133 env[1309]: 2025-05-13 00:51:02.502 [INFO][2516] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d9522d2ed99dc4f0e07e48778d56d3e8f5d6bd76298e9e0c8cf018dfe636ea38" HandleID="k8s-pod-network.d9522d2ed99dc4f0e07e48778d56d3e8f5d6bd76298e9e0c8cf018dfe636ea38" Workload="10.0.0.142-k8s-nginx--deployment--85f456d6dd--jppp2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002f66b0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.142", "pod":"nginx-deployment-85f456d6dd-jppp2", "timestamp":"2025-05-13 00:51:02.495553226 +0000 UTC"}, Hostname:"10.0.0.142", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:51:02.540133 env[1309]: 2025-05-13 00:51:02.502 [INFO][2516] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:51:02.540133 env[1309]: 2025-05-13 00:51:02.502 [INFO][2516] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:51:02.540133 env[1309]: 2025-05-13 00:51:02.502 [INFO][2516] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.142' May 13 00:51:02.540133 env[1309]: 2025-05-13 00:51:02.503 [INFO][2516] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d9522d2ed99dc4f0e07e48778d56d3e8f5d6bd76298e9e0c8cf018dfe636ea38" host="10.0.0.142" May 13 00:51:02.540133 env[1309]: 2025-05-13 00:51:02.506 [INFO][2516] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.142" May 13 00:51:02.540133 env[1309]: 2025-05-13 00:51:02.509 [INFO][2516] ipam/ipam.go 489: Trying affinity for 192.168.25.128/26 host="10.0.0.142" May 13 00:51:02.540133 env[1309]: 2025-05-13 00:51:02.511 [INFO][2516] ipam/ipam.go 155: Attempting to load block cidr=192.168.25.128/26 host="10.0.0.142" May 13 00:51:02.540133 env[1309]: 2025-05-13 00:51:02.512 [INFO][2516] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.25.128/26 host="10.0.0.142" May 13 00:51:02.540133 env[1309]: 2025-05-13 00:51:02.512 [INFO][2516] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.25.128/26 handle="k8s-pod-network.d9522d2ed99dc4f0e07e48778d56d3e8f5d6bd76298e9e0c8cf018dfe636ea38" host="10.0.0.142" May 13 00:51:02.540133 env[1309]: 2025-05-13 00:51:02.513 [INFO][2516] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.d9522d2ed99dc4f0e07e48778d56d3e8f5d6bd76298e9e0c8cf018dfe636ea38 May 13 00:51:02.540133 env[1309]: 2025-05-13 00:51:02.516 [INFO][2516] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.25.128/26 handle="k8s-pod-network.d9522d2ed99dc4f0e07e48778d56d3e8f5d6bd76298e9e0c8cf018dfe636ea38" host="10.0.0.142" May 13 00:51:02.540133 env[1309]: 2025-05-13 00:51:02.520 [INFO][2516] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.25.129/26] block=192.168.25.128/26 handle="k8s-pod-network.d9522d2ed99dc4f0e07e48778d56d3e8f5d6bd76298e9e0c8cf018dfe636ea38" host="10.0.0.142" May 13 00:51:02.540133 env[1309]: 2025-05-13 00:51:02.520 [INFO][2516] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.25.129/26] handle="k8s-pod-network.d9522d2ed99dc4f0e07e48778d56d3e8f5d6bd76298e9e0c8cf018dfe636ea38" host="10.0.0.142" May 13 00:51:02.540133 env[1309]: 2025-05-13 00:51:02.520 [INFO][2516] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:51:02.540133 env[1309]: 2025-05-13 00:51:02.520 [INFO][2516] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.25.129/26] IPv6=[] ContainerID="d9522d2ed99dc4f0e07e48778d56d3e8f5d6bd76298e9e0c8cf018dfe636ea38" HandleID="k8s-pod-network.d9522d2ed99dc4f0e07e48778d56d3e8f5d6bd76298e9e0c8cf018dfe636ea38" Workload="10.0.0.142-k8s-nginx--deployment--85f456d6dd--jppp2-eth0" May 13 00:51:02.540881 env[1309]: 2025-05-13 00:51:02.522 [INFO][2501] cni-plugin/k8s.go 386: Populated endpoint ContainerID="d9522d2ed99dc4f0e07e48778d56d3e8f5d6bd76298e9e0c8cf018dfe636ea38" Namespace="default" Pod="nginx-deployment-85f456d6dd-jppp2" WorkloadEndpoint="10.0.0.142-k8s-nginx--deployment--85f456d6dd--jppp2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.142-k8s-nginx--deployment--85f456d6dd--jppp2-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"f5ee848a-452f-46a5-af6c-814792531001", ResourceVersion:"1024", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 50, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.142", ContainerID:"", Pod:"nginx-deployment-85f456d6dd-jppp2", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.25.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"caliab46855d29e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:51:02.540881 env[1309]: 2025-05-13 00:51:02.522 [INFO][2501] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.25.129/32] ContainerID="d9522d2ed99dc4f0e07e48778d56d3e8f5d6bd76298e9e0c8cf018dfe636ea38" Namespace="default" Pod="nginx-deployment-85f456d6dd-jppp2" WorkloadEndpoint="10.0.0.142-k8s-nginx--deployment--85f456d6dd--jppp2-eth0" May 13 00:51:02.540881 env[1309]: 2025-05-13 00:51:02.522 [INFO][2501] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to caliab46855d29e ContainerID="d9522d2ed99dc4f0e07e48778d56d3e8f5d6bd76298e9e0c8cf018dfe636ea38" Namespace="default" Pod="nginx-deployment-85f456d6dd-jppp2" WorkloadEndpoint="10.0.0.142-k8s-nginx--deployment--85f456d6dd--jppp2-eth0" May 13 00:51:02.540881 env[1309]: 2025-05-13 00:51:02.526 [INFO][2501] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d9522d2ed99dc4f0e07e48778d56d3e8f5d6bd76298e9e0c8cf018dfe636ea38" Namespace="default" Pod="nginx-deployment-85f456d6dd-jppp2" WorkloadEndpoint="10.0.0.142-k8s-nginx--deployment--85f456d6dd--jppp2-eth0" May 13 00:51:02.540881 env[1309]: 2025-05-13 00:51:02.527 [INFO][2501] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="d9522d2ed99dc4f0e07e48778d56d3e8f5d6bd76298e9e0c8cf018dfe636ea38" Namespace="default" Pod="nginx-deployment-85f456d6dd-jppp2" WorkloadEndpoint="10.0.0.142-k8s-nginx--deployment--85f456d6dd--jppp2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.142-k8s-nginx--deployment--85f456d6dd--jppp2-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"f5ee848a-452f-46a5-af6c-814792531001", ResourceVersion:"1024", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 50, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.142", ContainerID:"d9522d2ed99dc4f0e07e48778d56d3e8f5d6bd76298e9e0c8cf018dfe636ea38", Pod:"nginx-deployment-85f456d6dd-jppp2", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.25.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"caliab46855d29e", MAC:"ae:d0:1a:96:39:0d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:51:02.540881 env[1309]: 2025-05-13 00:51:02.537 [INFO][2501] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="d9522d2ed99dc4f0e07e48778d56d3e8f5d6bd76298e9e0c8cf018dfe636ea38" Namespace="default" Pod="nginx-deployment-85f456d6dd-jppp2" WorkloadEndpoint="10.0.0.142-k8s-nginx--deployment--85f456d6dd--jppp2-eth0" May 13 00:51:02.546000 audit[2536]: NETFILTER_CFG table=filter:81 family=2 entries=34 op=nft_register_chain pid=2536 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:51:02.548310 kernel: kauditd_printk_skb: 541 callbacks suppressed May 13 00:51:02.548373 kernel: audit: type=1325 audit(1747097462.546:349): table=filter:81 family=2 entries=34 op=nft_register_chain pid=2536 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:51:02.546000 audit[2536]: SYSCALL arch=c000003e syscall=46 success=yes exit=19124 a0=3 a1=7ffdbb075310 a2=0 a3=7ffdbb0752fc items=0 ppid=2257 pid=2536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:51:02.555172 kernel: audit: type=1300 audit(1747097462.546:349): arch=c000003e syscall=46 success=yes exit=19124 a0=3 a1=7ffdbb075310 a2=0 a3=7ffdbb0752fc items=0 ppid=2257 pid=2536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:51:02.555233 kernel: audit: type=1327 audit(1747097462.546:349): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:51:02.546000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:51:02.611772 env[1309]: time="2025-05-13T00:51:02.611634806Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:51:02.611772 env[1309]: time="2025-05-13T00:51:02.611672279Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:51:02.611772 env[1309]: time="2025-05-13T00:51:02.611681276Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:51:02.611962 env[1309]: time="2025-05-13T00:51:02.611824380Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d9522d2ed99dc4f0e07e48778d56d3e8f5d6bd76298e9e0c8cf018dfe636ea38 pid=2548 runtime=io.containerd.runc.v2 May 13 00:51:02.633699 systemd-resolved[1225]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:51:02.653130 env[1309]: time="2025-05-13T00:51:02.653063575Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-jppp2,Uid:f5ee848a-452f-46a5-af6c-814792531001,Namespace:default,Attempt:1,} returns sandbox id \"d9522d2ed99dc4f0e07e48778d56d3e8f5d6bd76298e9e0c8cf018dfe636ea38\"" May 13 00:51:02.654235 env[1309]: time="2025-05-13T00:51:02.654215604Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 13 00:51:02.777385 env[1309]: time="2025-05-13T00:51:02.777291466Z" level=info msg="StopPodSandbox for \"26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f\"" May 13 00:51:02.902305 env[1309]: 2025-05-13 00:51:02.877 [INFO][2598] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f" May 13 00:51:02.902305 env[1309]: 2025-05-13 00:51:02.878 [INFO][2598] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f" iface="eth0" netns="/var/run/netns/cni-750c3906-e283-eaa2-6f32-26c3b0d8b9fc" May 13 00:51:02.902305 env[1309]: 2025-05-13 00:51:02.878 [INFO][2598] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f" iface="eth0" netns="/var/run/netns/cni-750c3906-e283-eaa2-6f32-26c3b0d8b9fc" May 13 00:51:02.902305 env[1309]: 2025-05-13 00:51:02.878 [INFO][2598] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f" iface="eth0" netns="/var/run/netns/cni-750c3906-e283-eaa2-6f32-26c3b0d8b9fc" May 13 00:51:02.902305 env[1309]: 2025-05-13 00:51:02.878 [INFO][2598] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f" May 13 00:51:02.902305 env[1309]: 2025-05-13 00:51:02.878 [INFO][2598] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f" May 13 00:51:02.902305 env[1309]: 2025-05-13 00:51:02.893 [INFO][2607] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f" HandleID="k8s-pod-network.26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f" Workload="10.0.0.142-k8s-csi--node--driver--jgsmr-eth0" May 13 00:51:02.902305 env[1309]: 2025-05-13 00:51:02.893 [INFO][2607] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:51:02.902305 env[1309]: 2025-05-13 00:51:02.893 [INFO][2607] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:51:02.902305 env[1309]: 2025-05-13 00:51:02.898 [WARNING][2607] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f" HandleID="k8s-pod-network.26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f" Workload="10.0.0.142-k8s-csi--node--driver--jgsmr-eth0" May 13 00:51:02.902305 env[1309]: 2025-05-13 00:51:02.898 [INFO][2607] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f" HandleID="k8s-pod-network.26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f" Workload="10.0.0.142-k8s-csi--node--driver--jgsmr-eth0" May 13 00:51:02.902305 env[1309]: 2025-05-13 00:51:02.899 [INFO][2607] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:51:02.902305 env[1309]: 2025-05-13 00:51:02.900 [INFO][2598] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f" May 13 00:51:02.902847 env[1309]: time="2025-05-13T00:51:02.902341514Z" level=info msg="TearDown network for sandbox \"26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f\" successfully" May 13 00:51:02.902847 env[1309]: time="2025-05-13T00:51:02.902375119Z" level=info msg="StopPodSandbox for \"26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f\" returns successfully" May 13 00:51:02.903019 env[1309]: time="2025-05-13T00:51:02.902991010Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-jgsmr,Uid:a5a07571-4660-42ee-a93f-618103603d07,Namespace:calico-system,Attempt:1,}" May 13 00:51:02.987084 systemd-networkd[1084]: cali819e5919834: Link UP May 13 00:51:02.988648 systemd-networkd[1084]: cali819e5919834: Gained carrier May 13 00:51:02.989017 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali819e5919834: link becomes ready May 13 00:51:02.996838 env[1309]: 2025-05-13 00:51:02.938 [INFO][2615] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.142-k8s-csi--node--driver--jgsmr-eth0 csi-node-driver- calico-system a5a07571-4660-42ee-a93f-618103603d07 1033 0 2025-05-13 00:50:32 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b7b4b9d k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.0.0.142 csi-node-driver-jgsmr eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali819e5919834 [] []}} ContainerID="d21dd8e5b23bdf0666ff073fb6d5feb38a65c80d6f3dcf15a4f851b9b5094b84" Namespace="calico-system" Pod="csi-node-driver-jgsmr" WorkloadEndpoint="10.0.0.142-k8s-csi--node--driver--jgsmr-" May 13 00:51:02.996838 env[1309]: 2025-05-13 00:51:02.938 [INFO][2615] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="d21dd8e5b23bdf0666ff073fb6d5feb38a65c80d6f3dcf15a4f851b9b5094b84" Namespace="calico-system" Pod="csi-node-driver-jgsmr" WorkloadEndpoint="10.0.0.142-k8s-csi--node--driver--jgsmr-eth0" May 13 00:51:02.996838 env[1309]: 2025-05-13 00:51:02.959 [INFO][2630] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d21dd8e5b23bdf0666ff073fb6d5feb38a65c80d6f3dcf15a4f851b9b5094b84" HandleID="k8s-pod-network.d21dd8e5b23bdf0666ff073fb6d5feb38a65c80d6f3dcf15a4f851b9b5094b84" Workload="10.0.0.142-k8s-csi--node--driver--jgsmr-eth0" May 13 00:51:02.996838 env[1309]: 2025-05-13 00:51:02.965 [INFO][2630] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d21dd8e5b23bdf0666ff073fb6d5feb38a65c80d6f3dcf15a4f851b9b5094b84" HandleID="k8s-pod-network.d21dd8e5b23bdf0666ff073fb6d5feb38a65c80d6f3dcf15a4f851b9b5094b84" Workload="10.0.0.142-k8s-csi--node--driver--jgsmr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002e59e0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.142", "pod":"csi-node-driver-jgsmr", "timestamp":"2025-05-13 00:51:02.959848781 +0000 UTC"}, Hostname:"10.0.0.142", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:51:02.996838 env[1309]: 2025-05-13 00:51:02.966 [INFO][2630] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:51:02.996838 env[1309]: 2025-05-13 00:51:02.966 [INFO][2630] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:51:02.996838 env[1309]: 2025-05-13 00:51:02.966 [INFO][2630] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.142' May 13 00:51:02.996838 env[1309]: 2025-05-13 00:51:02.967 [INFO][2630] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d21dd8e5b23bdf0666ff073fb6d5feb38a65c80d6f3dcf15a4f851b9b5094b84" host="10.0.0.142" May 13 00:51:02.996838 env[1309]: 2025-05-13 00:51:02.969 [INFO][2630] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.142" May 13 00:51:02.996838 env[1309]: 2025-05-13 00:51:02.973 [INFO][2630] ipam/ipam.go 489: Trying affinity for 192.168.25.128/26 host="10.0.0.142" May 13 00:51:02.996838 env[1309]: 2025-05-13 00:51:02.974 [INFO][2630] ipam/ipam.go 155: Attempting to load block cidr=192.168.25.128/26 host="10.0.0.142" May 13 00:51:02.996838 env[1309]: 2025-05-13 00:51:02.975 [INFO][2630] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.25.128/26 host="10.0.0.142" May 13 00:51:02.996838 env[1309]: 2025-05-13 00:51:02.975 [INFO][2630] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.25.128/26 handle="k8s-pod-network.d21dd8e5b23bdf0666ff073fb6d5feb38a65c80d6f3dcf15a4f851b9b5094b84" host="10.0.0.142" May 13 00:51:02.996838 env[1309]: 2025-05-13 00:51:02.977 [INFO][2630] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.d21dd8e5b23bdf0666ff073fb6d5feb38a65c80d6f3dcf15a4f851b9b5094b84 May 13 00:51:02.996838 env[1309]: 2025-05-13 00:51:02.980 [INFO][2630] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.25.128/26 handle="k8s-pod-network.d21dd8e5b23bdf0666ff073fb6d5feb38a65c80d6f3dcf15a4f851b9b5094b84" host="10.0.0.142" May 13 00:51:02.996838 env[1309]: 2025-05-13 00:51:02.983 [INFO][2630] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.25.130/26] block=192.168.25.128/26 handle="k8s-pod-network.d21dd8e5b23bdf0666ff073fb6d5feb38a65c80d6f3dcf15a4f851b9b5094b84" host="10.0.0.142" May 13 00:51:02.996838 env[1309]: 2025-05-13 00:51:02.983 [INFO][2630] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.25.130/26] handle="k8s-pod-network.d21dd8e5b23bdf0666ff073fb6d5feb38a65c80d6f3dcf15a4f851b9b5094b84" host="10.0.0.142" May 13 00:51:02.996838 env[1309]: 2025-05-13 00:51:02.983 [INFO][2630] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:51:02.996838 env[1309]: 2025-05-13 00:51:02.983 [INFO][2630] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.25.130/26] IPv6=[] ContainerID="d21dd8e5b23bdf0666ff073fb6d5feb38a65c80d6f3dcf15a4f851b9b5094b84" HandleID="k8s-pod-network.d21dd8e5b23bdf0666ff073fb6d5feb38a65c80d6f3dcf15a4f851b9b5094b84" Workload="10.0.0.142-k8s-csi--node--driver--jgsmr-eth0" May 13 00:51:02.997517 env[1309]: 2025-05-13 00:51:02.985 [INFO][2615] cni-plugin/k8s.go 386: Populated endpoint ContainerID="d21dd8e5b23bdf0666ff073fb6d5feb38a65c80d6f3dcf15a4f851b9b5094b84" Namespace="calico-system" Pod="csi-node-driver-jgsmr" WorkloadEndpoint="10.0.0.142-k8s-csi--node--driver--jgsmr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.142-k8s-csi--node--driver--jgsmr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a5a07571-4660-42ee-a93f-618103603d07", ResourceVersion:"1033", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 50, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.142", ContainerID:"", Pod:"csi-node-driver-jgsmr", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.25.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali819e5919834", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:51:02.997517 env[1309]: 2025-05-13 00:51:02.985 [INFO][2615] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.25.130/32] ContainerID="d21dd8e5b23bdf0666ff073fb6d5feb38a65c80d6f3dcf15a4f851b9b5094b84" Namespace="calico-system" Pod="csi-node-driver-jgsmr" WorkloadEndpoint="10.0.0.142-k8s-csi--node--driver--jgsmr-eth0" May 13 00:51:02.997517 env[1309]: 2025-05-13 00:51:02.985 [INFO][2615] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali819e5919834 ContainerID="d21dd8e5b23bdf0666ff073fb6d5feb38a65c80d6f3dcf15a4f851b9b5094b84" Namespace="calico-system" Pod="csi-node-driver-jgsmr" WorkloadEndpoint="10.0.0.142-k8s-csi--node--driver--jgsmr-eth0" May 13 00:51:02.997517 env[1309]: 2025-05-13 00:51:02.988 [INFO][2615] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d21dd8e5b23bdf0666ff073fb6d5feb38a65c80d6f3dcf15a4f851b9b5094b84" Namespace="calico-system" Pod="csi-node-driver-jgsmr" WorkloadEndpoint="10.0.0.142-k8s-csi--node--driver--jgsmr-eth0" May 13 00:51:02.997517 env[1309]: 2025-05-13 00:51:02.989 [INFO][2615] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="d21dd8e5b23bdf0666ff073fb6d5feb38a65c80d6f3dcf15a4f851b9b5094b84" Namespace="calico-system" Pod="csi-node-driver-jgsmr" WorkloadEndpoint="10.0.0.142-k8s-csi--node--driver--jgsmr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.142-k8s-csi--node--driver--jgsmr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a5a07571-4660-42ee-a93f-618103603d07", ResourceVersion:"1033", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 50, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.142", ContainerID:"d21dd8e5b23bdf0666ff073fb6d5feb38a65c80d6f3dcf15a4f851b9b5094b84", Pod:"csi-node-driver-jgsmr", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.25.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali819e5919834", MAC:"82:45:7b:d6:b2:35", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:51:02.997517 env[1309]: 2025-05-13 00:51:02.995 [INFO][2615] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="d21dd8e5b23bdf0666ff073fb6d5feb38a65c80d6f3dcf15a4f851b9b5094b84" Namespace="calico-system" Pod="csi-node-driver-jgsmr" WorkloadEndpoint="10.0.0.142-k8s-csi--node--driver--jgsmr-eth0" May 13 00:51:03.004000 audit[2656]: NETFILTER_CFG table=filter:82 family=2 entries=38 op=nft_register_chain pid=2656 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:51:03.006624 env[1309]: time="2025-05-13T00:51:03.006524190Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:51:03.006624 env[1309]: time="2025-05-13T00:51:03.006579336Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:51:03.006624 env[1309]: time="2025-05-13T00:51:03.006601879Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:51:03.007073 env[1309]: time="2025-05-13T00:51:03.006981546Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d21dd8e5b23bdf0666ff073fb6d5feb38a65c80d6f3dcf15a4f851b9b5094b84 pid=2660 runtime=io.containerd.runc.v2 May 13 00:51:03.004000 audit[2656]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffd6afbebb0 a2=0 a3=7ffd6afbeb9c items=0 ppid=2257 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:51:03.013833 kernel: audit: type=1325 audit(1747097463.004:350): table=filter:82 family=2 entries=38 op=nft_register_chain pid=2656 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:51:03.013886 kernel: audit: type=1300 audit(1747097463.004:350): arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffd6afbebb0 a2=0 a3=7ffd6afbeb9c items=0 ppid=2257 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:51:03.013915 kernel: audit: type=1327 audit(1747097463.004:350): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:51:03.004000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:51:03.026964 systemd-resolved[1225]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:51:03.036636 env[1309]: time="2025-05-13T00:51:03.036161725Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-jgsmr,Uid:a5a07571-4660-42ee-a93f-618103603d07,Namespace:calico-system,Attempt:1,} returns sandbox id \"d21dd8e5b23bdf0666ff073fb6d5feb38a65c80d6f3dcf15a4f851b9b5094b84\"" May 13 00:51:03.309095 kubelet[1596]: E0513 00:51:03.309068 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:51:03.435537 systemd[1]: run-netns-cni\x2d750c3906\x2de283\x2deaa2\x2d6f32\x2d26c3b0d8b9fc.mount: Deactivated successfully. May 13 00:51:03.647000 audit[2700]: NETFILTER_CFG table=filter:83 family=2 entries=8 op=nft_register_rule pid=2700 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:51:03.647000 audit[2700]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fffafbf2860 a2=0 a3=7fffafbf284c items=0 ppid=1812 pid=2700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:51:03.655405 kernel: audit: type=1325 audit(1747097463.647:351): table=filter:83 family=2 entries=8 op=nft_register_rule pid=2700 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:51:03.655451 kernel: audit: type=1300 audit(1747097463.647:351): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fffafbf2860 a2=0 a3=7fffafbf284c items=0 ppid=1812 pid=2700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:51:03.647000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:51:03.657632 kernel: audit: type=1327 audit(1747097463.647:351): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:51:03.657000 audit[2700]: NETFILTER_CFG table=nat:84 family=2 entries=30 op=nft_register_rule pid=2700 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:51:03.657000 audit[2700]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7fffafbf2860 a2=0 a3=7fffafbf284c items=0 ppid=1812 pid=2700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:51:03.660833 kernel: audit: type=1325 audit(1747097463.657:352): table=nat:84 family=2 entries=30 op=nft_register_rule pid=2700 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:51:03.657000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:51:04.229034 systemd-networkd[1084]: cali819e5919834: Gained IPv6LL May 13 00:51:04.310228 kubelet[1596]: E0513 00:51:04.310191 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:51:04.547992 systemd-networkd[1084]: caliab46855d29e: Gained IPv6LL May 13 00:51:05.310630 kubelet[1596]: E0513 00:51:05.310581 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:51:05.391877 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1208934135.mount: Deactivated successfully. May 13 00:51:06.311554 kubelet[1596]: E0513 00:51:06.311520 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:51:07.311948 kubelet[1596]: E0513 00:51:07.311895 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:51:07.674177 env[1309]: time="2025-05-13T00:51:07.674050169Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:51:07.675963 env[1309]: time="2025-05-13T00:51:07.675928309Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:51:07.677624 env[1309]: time="2025-05-13T00:51:07.677581402Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:51:07.679093 env[1309]: time="2025-05-13T00:51:07.679074539Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:51:07.679650 env[1309]: time="2025-05-13T00:51:07.679617173Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa\"" May 13 00:51:07.680763 env[1309]: time="2025-05-13T00:51:07.680727902Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 13 00:51:07.681708 env[1309]: time="2025-05-13T00:51:07.681682652Z" level=info msg="CreateContainer within sandbox \"d9522d2ed99dc4f0e07e48778d56d3e8f5d6bd76298e9e0c8cf018dfe636ea38\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" May 13 00:51:07.692620 env[1309]: time="2025-05-13T00:51:07.692588367Z" level=info msg="CreateContainer within sandbox \"d9522d2ed99dc4f0e07e48778d56d3e8f5d6bd76298e9e0c8cf018dfe636ea38\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"f2667e8f448b190af12299b5a124355fcad4278aeb7719329d37ee8ec3f888bd\"" May 13 00:51:07.692962 env[1309]: time="2025-05-13T00:51:07.692933275Z" level=info msg="StartContainer for \"f2667e8f448b190af12299b5a124355fcad4278aeb7719329d37ee8ec3f888bd\"" May 13 00:51:07.726575 env[1309]: time="2025-05-13T00:51:07.726515631Z" level=info msg="StartContainer for \"f2667e8f448b190af12299b5a124355fcad4278aeb7719329d37ee8ec3f888bd\" returns successfully" May 13 00:51:08.312449 kubelet[1596]: E0513 00:51:08.312398 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:51:09.172302 env[1309]: time="2025-05-13T00:51:09.172242510Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:51:09.173797 env[1309]: time="2025-05-13T00:51:09.173768173Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:51:09.175136 env[1309]: time="2025-05-13T00:51:09.175105448Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:51:09.176323 env[1309]: time="2025-05-13T00:51:09.176295193Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:51:09.176649 env[1309]: time="2025-05-13T00:51:09.176621273Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505\"" May 13 00:51:09.178241 env[1309]: time="2025-05-13T00:51:09.178214184Z" level=info msg="CreateContainer within sandbox \"d21dd8e5b23bdf0666ff073fb6d5feb38a65c80d6f3dcf15a4f851b9b5094b84\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 13 00:51:09.190087 env[1309]: time="2025-05-13T00:51:09.190053665Z" level=info msg="CreateContainer within sandbox \"d21dd8e5b23bdf0666ff073fb6d5feb38a65c80d6f3dcf15a4f851b9b5094b84\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"f3f8afdabca36ceb83b913163d763d7e705f79bd41eed7ffc3476f69a667c4aa\"" May 13 00:51:09.190413 env[1309]: time="2025-05-13T00:51:09.190391509Z" level=info msg="StartContainer for \"f3f8afdabca36ceb83b913163d763d7e705f79bd41eed7ffc3476f69a667c4aa\"" May 13 00:51:09.227076 env[1309]: time="2025-05-13T00:51:09.225956801Z" level=info msg="StartContainer for \"f3f8afdabca36ceb83b913163d763d7e705f79bd41eed7ffc3476f69a667c4aa\" returns successfully" May 13 00:51:09.227204 env[1309]: time="2025-05-13T00:51:09.227148068Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 13 00:51:09.313311 kubelet[1596]: E0513 00:51:09.313283 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:51:10.314323 kubelet[1596]: E0513 00:51:10.314294 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:51:10.853396 env[1309]: time="2025-05-13T00:51:10.853349595Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:51:10.855080 env[1309]: time="2025-05-13T00:51:10.855056320Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:51:10.858453 env[1309]: time="2025-05-13T00:51:10.858411710Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:51:10.860021 env[1309]: time="2025-05-13T00:51:10.859991815Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:51:10.860449 env[1309]: time="2025-05-13T00:51:10.860414509Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9\"" May 13 00:51:10.862437 env[1309]: time="2025-05-13T00:51:10.862390114Z" level=info msg="CreateContainer within sandbox \"d21dd8e5b23bdf0666ff073fb6d5feb38a65c80d6f3dcf15a4f851b9b5094b84\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 13 00:51:10.875208 env[1309]: time="2025-05-13T00:51:10.875177217Z" level=info msg="CreateContainer within sandbox \"d21dd8e5b23bdf0666ff073fb6d5feb38a65c80d6f3dcf15a4f851b9b5094b84\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"183e0423d70c4940ba918ec2983388f2814d7b2db246fa31d98516ea388cb47f\"" May 13 00:51:10.875510 env[1309]: time="2025-05-13T00:51:10.875486905Z" level=info msg="StartContainer for \"183e0423d70c4940ba918ec2983388f2814d7b2db246fa31d98516ea388cb47f\"" May 13 00:51:10.914335 env[1309]: time="2025-05-13T00:51:10.914294502Z" level=info msg="StartContainer for \"183e0423d70c4940ba918ec2983388f2814d7b2db246fa31d98516ea388cb47f\" returns successfully" May 13 00:51:11.098366 update_engine[1300]: I0513 00:51:11.098325 1300 update_attempter.cc:509] Updating boot flags... May 13 00:51:11.315021 kubelet[1596]: E0513 00:51:11.314963 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:51:11.771941 kubelet[1596]: I0513 00:51:11.771876 1596 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 13 00:51:11.771941 kubelet[1596]: I0513 00:51:11.771905 1596 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 13 00:51:11.850356 kubelet[1596]: I0513 00:51:11.850304 1596 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-jgsmr" podStartSLOduration=32.02633949 podStartE2EDuration="39.850289492s" podCreationTimestamp="2025-05-13 00:50:32 +0000 UTC" firstStartedPulling="2025-05-13 00:51:03.037216386 +0000 UTC m=+31.162249500" lastFinishedPulling="2025-05-13 00:51:10.861166388 +0000 UTC m=+38.986199502" observedRunningTime="2025-05-13 00:51:11.850103108 +0000 UTC m=+39.975136252" watchObservedRunningTime="2025-05-13 00:51:11.850289492 +0000 UTC m=+39.975322616" May 13 00:51:11.850493 kubelet[1596]: I0513 00:51:11.850411 1596 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-85f456d6dd-jppp2" podStartSLOduration=17.823669195 podStartE2EDuration="22.850407817s" podCreationTimestamp="2025-05-13 00:50:49 +0000 UTC" firstStartedPulling="2025-05-13 00:51:02.653878428 +0000 UTC m=+30.778911542" lastFinishedPulling="2025-05-13 00:51:07.68061705 +0000 UTC m=+35.805650164" observedRunningTime="2025-05-13 00:51:07.841260367 +0000 UTC m=+35.966293481" watchObservedRunningTime="2025-05-13 00:51:11.850407817 +0000 UTC m=+39.975440931" May 13 00:51:12.286156 kubelet[1596]: E0513 00:51:12.286124 1596 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:51:12.315797 kubelet[1596]: E0513 00:51:12.315776 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:51:12.840000 audit[2853]: NETFILTER_CFG table=filter:85 family=2 entries=20 op=nft_register_rule pid=2853 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:51:12.843370 kernel: kauditd_printk_skb: 2 callbacks suppressed May 13 00:51:12.843438 kernel: audit: type=1325 audit(1747097472.840:353): table=filter:85 family=2 entries=20 op=nft_register_rule pid=2853 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:51:12.840000 audit[2853]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffe75eaf0d0 a2=0 a3=7ffe75eaf0bc items=0 ppid=1812 pid=2853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:51:12.850151 kernel: audit: type=1300 audit(1747097472.840:353): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffe75eaf0d0 a2=0 a3=7ffe75eaf0bc items=0 ppid=1812 pid=2853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:51:12.850202 kernel: audit: type=1327 audit(1747097472.840:353): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:51:12.840000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:51:12.854000 audit[2853]: NETFILTER_CFG table=nat:86 family=2 entries=22 op=nft_register_rule pid=2853 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:51:12.854000 audit[2853]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe75eaf0d0 a2=0 a3=0 items=0 ppid=1812 pid=2853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:51:12.863039 kernel: audit: type=1325 audit(1747097472.854:354): table=nat:86 family=2 entries=22 op=nft_register_rule pid=2853 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:51:12.863080 kernel: audit: type=1300 audit(1747097472.854:354): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe75eaf0d0 a2=0 a3=0 items=0 ppid=1812 pid=2853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:51:12.863106 kernel: audit: type=1327 audit(1747097472.854:354): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:51:12.854000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:51:12.869000 audit[2855]: NETFILTER_CFG table=filter:87 family=2 entries=32 op=nft_register_rule pid=2855 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:51:12.869000 audit[2855]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffcefb3bad0 a2=0 a3=7ffcefb3babc items=0 ppid=1812 pid=2855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:51:12.874640 kubelet[1596]: I0513 00:51:12.874601 1596 topology_manager.go:215] "Topology Admit Handler" podUID="edaf4b33-543a-4df4-a96e-afeb42a8b13c" podNamespace="default" podName="nfs-server-provisioner-0" May 13 00:51:12.879367 kernel: audit: type=1325 audit(1747097472.869:355): table=filter:87 family=2 entries=32 op=nft_register_rule pid=2855 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:51:12.879426 kernel: audit: type=1300 audit(1747097472.869:355): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffcefb3bad0 a2=0 a3=7ffcefb3babc items=0 ppid=1812 pid=2855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:51:12.879454 kernel: audit: type=1327 audit(1747097472.869:355): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:51:12.869000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:51:12.882000 audit[2855]: NETFILTER_CFG table=nat:88 family=2 entries=22 op=nft_register_rule pid=2855 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:51:12.882000 audit[2855]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffcefb3bad0 a2=0 a3=0 items=0 ppid=1812 pid=2855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:51:12.882000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:51:12.886833 kernel: audit: type=1325 audit(1747097472.882:356): table=nat:88 family=2 entries=22 op=nft_register_rule pid=2855 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:51:12.914187 kubelet[1596]: I0513 00:51:12.914167 1596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9zmd7\" (UniqueName: \"kubernetes.io/projected/edaf4b33-543a-4df4-a96e-afeb42a8b13c-kube-api-access-9zmd7\") pod \"nfs-server-provisioner-0\" (UID: \"edaf4b33-543a-4df4-a96e-afeb42a8b13c\") " pod="default/nfs-server-provisioner-0" May 13 00:51:12.914257 kubelet[1596]: I0513 00:51:12.914206 1596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/edaf4b33-543a-4df4-a96e-afeb42a8b13c-data\") pod \"nfs-server-provisioner-0\" (UID: \"edaf4b33-543a-4df4-a96e-afeb42a8b13c\") " pod="default/nfs-server-provisioner-0" May 13 00:51:13.178027 env[1309]: time="2025-05-13T00:51:13.177932207Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:edaf4b33-543a-4df4-a96e-afeb42a8b13c,Namespace:default,Attempt:0,}" May 13 00:51:13.262440 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 13 00:51:13.262581 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready May 13 00:51:13.262660 systemd-networkd[1084]: cali60e51b789ff: Link UP May 13 00:51:13.262985 systemd-networkd[1084]: cali60e51b789ff: Gained carrier May 13 00:51:13.270846 env[1309]: 2025-05-13 00:51:13.213 [INFO][2859] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.142-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default edaf4b33-543a-4df4-a96e-afeb42a8b13c 1119 0 2025-05-13 00:51:12 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.0.0.142 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="957547d9f279b2885b1abafaa259e3b61becbc068d6c294dd49d3b55aca65982" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.142-k8s-nfs--server--provisioner--0-" May 13 00:51:13.270846 env[1309]: 2025-05-13 00:51:13.213 [INFO][2859] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="957547d9f279b2885b1abafaa259e3b61becbc068d6c294dd49d3b55aca65982" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.142-k8s-nfs--server--provisioner--0-eth0" May 13 00:51:13.270846 env[1309]: 2025-05-13 00:51:13.231 [INFO][2873] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="957547d9f279b2885b1abafaa259e3b61becbc068d6c294dd49d3b55aca65982" HandleID="k8s-pod-network.957547d9f279b2885b1abafaa259e3b61becbc068d6c294dd49d3b55aca65982" Workload="10.0.0.142-k8s-nfs--server--provisioner--0-eth0" May 13 00:51:13.270846 env[1309]: 2025-05-13 00:51:13.238 [INFO][2873] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="957547d9f279b2885b1abafaa259e3b61becbc068d6c294dd49d3b55aca65982" HandleID="k8s-pod-network.957547d9f279b2885b1abafaa259e3b61becbc068d6c294dd49d3b55aca65982" Workload="10.0.0.142-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002dd100), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.142", "pod":"nfs-server-provisioner-0", "timestamp":"2025-05-13 00:51:13.231500767 +0000 UTC"}, Hostname:"10.0.0.142", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:51:13.270846 env[1309]: 2025-05-13 00:51:13.238 [INFO][2873] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:51:13.270846 env[1309]: 2025-05-13 00:51:13.238 [INFO][2873] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:51:13.270846 env[1309]: 2025-05-13 00:51:13.238 [INFO][2873] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.142' May 13 00:51:13.270846 env[1309]: 2025-05-13 00:51:13.239 [INFO][2873] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.957547d9f279b2885b1abafaa259e3b61becbc068d6c294dd49d3b55aca65982" host="10.0.0.142" May 13 00:51:13.270846 env[1309]: 2025-05-13 00:51:13.242 [INFO][2873] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.142" May 13 00:51:13.270846 env[1309]: 2025-05-13 00:51:13.245 [INFO][2873] ipam/ipam.go 489: Trying affinity for 192.168.25.128/26 host="10.0.0.142" May 13 00:51:13.270846 env[1309]: 2025-05-13 00:51:13.247 [INFO][2873] ipam/ipam.go 155: Attempting to load block cidr=192.168.25.128/26 host="10.0.0.142" May 13 00:51:13.270846 env[1309]: 2025-05-13 00:51:13.248 [INFO][2873] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.25.128/26 host="10.0.0.142" May 13 00:51:13.270846 env[1309]: 2025-05-13 00:51:13.248 [INFO][2873] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.25.128/26 handle="k8s-pod-network.957547d9f279b2885b1abafaa259e3b61becbc068d6c294dd49d3b55aca65982" host="10.0.0.142" May 13 00:51:13.270846 env[1309]: 2025-05-13 00:51:13.249 [INFO][2873] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.957547d9f279b2885b1abafaa259e3b61becbc068d6c294dd49d3b55aca65982 May 13 00:51:13.270846 env[1309]: 2025-05-13 00:51:13.253 [INFO][2873] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.25.128/26 handle="k8s-pod-network.957547d9f279b2885b1abafaa259e3b61becbc068d6c294dd49d3b55aca65982" host="10.0.0.142" May 13 00:51:13.270846 env[1309]: 2025-05-13 00:51:13.256 [INFO][2873] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.25.131/26] block=192.168.25.128/26 handle="k8s-pod-network.957547d9f279b2885b1abafaa259e3b61becbc068d6c294dd49d3b55aca65982" host="10.0.0.142" May 13 00:51:13.270846 env[1309]: 2025-05-13 00:51:13.256 [INFO][2873] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.25.131/26] handle="k8s-pod-network.957547d9f279b2885b1abafaa259e3b61becbc068d6c294dd49d3b55aca65982" host="10.0.0.142" May 13 00:51:13.270846 env[1309]: 2025-05-13 00:51:13.256 [INFO][2873] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:51:13.270846 env[1309]: 2025-05-13 00:51:13.256 [INFO][2873] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.25.131/26] IPv6=[] ContainerID="957547d9f279b2885b1abafaa259e3b61becbc068d6c294dd49d3b55aca65982" HandleID="k8s-pod-network.957547d9f279b2885b1abafaa259e3b61becbc068d6c294dd49d3b55aca65982" Workload="10.0.0.142-k8s-nfs--server--provisioner--0-eth0" May 13 00:51:13.271425 env[1309]: 2025-05-13 00:51:13.257 [INFO][2859] cni-plugin/k8s.go 386: Populated endpoint ContainerID="957547d9f279b2885b1abafaa259e3b61becbc068d6c294dd49d3b55aca65982" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.142-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.142-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"edaf4b33-543a-4df4-a96e-afeb42a8b13c", ResourceVersion:"1119", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 51, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.142", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.25.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:51:13.271425 env[1309]: 2025-05-13 00:51:13.257 [INFO][2859] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.25.131/32] ContainerID="957547d9f279b2885b1abafaa259e3b61becbc068d6c294dd49d3b55aca65982" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.142-k8s-nfs--server--provisioner--0-eth0" May 13 00:51:13.271425 env[1309]: 2025-05-13 00:51:13.257 [INFO][2859] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="957547d9f279b2885b1abafaa259e3b61becbc068d6c294dd49d3b55aca65982" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.142-k8s-nfs--server--provisioner--0-eth0" May 13 00:51:13.271425 env[1309]: 2025-05-13 00:51:13.262 [INFO][2859] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="957547d9f279b2885b1abafaa259e3b61becbc068d6c294dd49d3b55aca65982" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.142-k8s-nfs--server--provisioner--0-eth0" May 13 00:51:13.271604 env[1309]: 2025-05-13 00:51:13.263 [INFO][2859] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="957547d9f279b2885b1abafaa259e3b61becbc068d6c294dd49d3b55aca65982" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.142-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.142-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"edaf4b33-543a-4df4-a96e-afeb42a8b13c", ResourceVersion:"1119", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 51, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.142", ContainerID:"957547d9f279b2885b1abafaa259e3b61becbc068d6c294dd49d3b55aca65982", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.25.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"7a:f9:93:31:52:6a", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:51:13.271604 env[1309]: 2025-05-13 00:51:13.269 [INFO][2859] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="957547d9f279b2885b1abafaa259e3b61becbc068d6c294dd49d3b55aca65982" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.142-k8s-nfs--server--provisioner--0-eth0" May 13 00:51:13.279000 audit[2901]: NETFILTER_CFG table=filter:89 family=2 entries=38 op=nft_register_chain pid=2901 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:51:13.279000 audit[2901]: SYSCALL arch=c000003e syscall=46 success=yes exit=19820 a0=3 a1=7ffc104e8860 a2=0 a3=7ffc104e884c items=0 ppid=2257 pid=2901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:51:13.279000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:51:13.282002 env[1309]: time="2025-05-13T00:51:13.281925465Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:51:13.282002 env[1309]: time="2025-05-13T00:51:13.281966673Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:51:13.282002 env[1309]: time="2025-05-13T00:51:13.281976481Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:51:13.282252 env[1309]: time="2025-05-13T00:51:13.282224612Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/957547d9f279b2885b1abafaa259e3b61becbc068d6c294dd49d3b55aca65982 pid=2902 runtime=io.containerd.runc.v2 May 13 00:51:13.300282 systemd-resolved[1225]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:51:13.315994 kubelet[1596]: E0513 00:51:13.315943 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:51:13.321136 env[1309]: time="2025-05-13T00:51:13.321088260Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:edaf4b33-543a-4df4-a96e-afeb42a8b13c,Namespace:default,Attempt:0,} returns sandbox id \"957547d9f279b2885b1abafaa259e3b61becbc068d6c294dd49d3b55aca65982\"" May 13 00:51:13.322326 env[1309]: time="2025-05-13T00:51:13.322292805Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" May 13 00:51:14.316980 kubelet[1596]: E0513 00:51:14.316923 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:51:15.300044 systemd-networkd[1084]: cali60e51b789ff: Gained IPv6LL May 13 00:51:15.317721 kubelet[1596]: E0513 00:51:15.317685 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:51:16.218869 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1846718408.mount: Deactivated successfully. May 13 00:51:16.318025 kubelet[1596]: E0513 00:51:16.317974 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:51:17.319094 kubelet[1596]: E0513 00:51:17.319031 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:51:18.319630 kubelet[1596]: E0513 00:51:18.319578 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:51:18.459696 env[1309]: time="2025-05-13T00:51:18.459641346Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:51:18.461457 env[1309]: time="2025-05-13T00:51:18.461404811Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:51:18.462979 env[1309]: time="2025-05-13T00:51:18.462955504Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:51:18.464463 env[1309]: time="2025-05-13T00:51:18.464406547Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:51:18.465003 env[1309]: time="2025-05-13T00:51:18.464973370Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" May 13 00:51:18.467435 env[1309]: time="2025-05-13T00:51:18.467408755Z" level=info msg="CreateContainer within sandbox \"957547d9f279b2885b1abafaa259e3b61becbc068d6c294dd49d3b55aca65982\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" May 13 00:51:18.476675 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1546085628.mount: Deactivated successfully. May 13 00:51:18.478266 env[1309]: time="2025-05-13T00:51:18.478231521Z" level=info msg="CreateContainer within sandbox \"957547d9f279b2885b1abafaa259e3b61becbc068d6c294dd49d3b55aca65982\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"007c0afe958b7fb90e51db52637c059752751d31b9fedf0adb480864586d696c\"" May 13 00:51:18.478655 env[1309]: time="2025-05-13T00:51:18.478620877Z" level=info msg="StartContainer for \"007c0afe958b7fb90e51db52637c059752751d31b9fedf0adb480864586d696c\"" May 13 00:51:18.511640 env[1309]: time="2025-05-13T00:51:18.511599820Z" level=info msg="StartContainer for \"007c0afe958b7fb90e51db52637c059752751d31b9fedf0adb480864586d696c\" returns successfully" May 13 00:51:18.874000 audit[3002]: NETFILTER_CFG table=filter:90 family=2 entries=20 op=nft_register_rule pid=3002 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:51:18.876640 kernel: kauditd_printk_skb: 5 callbacks suppressed May 13 00:51:18.876687 kernel: audit: type=1325 audit(1747097478.874:358): table=filter:90 family=2 entries=20 op=nft_register_rule pid=3002 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:51:18.874000 audit[3002]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff28cea0c0 a2=0 a3=7fff28cea0ac items=0 ppid=1812 pid=3002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:51:18.883463 kernel: audit: type=1300 audit(1747097478.874:358): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff28cea0c0 a2=0 a3=7fff28cea0ac items=0 ppid=1812 pid=3002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:51:18.883502 kernel: audit: type=1327 audit(1747097478.874:358): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:51:18.874000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:51:18.887000 audit[3002]: NETFILTER_CFG table=nat:91 family=2 entries=106 op=nft_register_chain pid=3002 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:51:18.887000 audit[3002]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fff28cea0c0 a2=0 a3=7fff28cea0ac items=0 ppid=1812 pid=3002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:51:18.895894 kernel: audit: type=1325 audit(1747097478.887:359): table=nat:91 family=2 entries=106 op=nft_register_chain pid=3002 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:51:18.895945 kernel: audit: type=1300 audit(1747097478.887:359): arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fff28cea0c0 a2=0 a3=7fff28cea0ac items=0 ppid=1812 pid=3002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:51:18.895968 kernel: audit: type=1327 audit(1747097478.887:359): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:51:18.887000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:51:18.988554 kubelet[1596]: E0513 00:51:18.988529 1596 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 13 00:51:19.000743 kubelet[1596]: I0513 00:51:19.000684 1596 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.8567944079999998 podStartE2EDuration="7.000664755s" podCreationTimestamp="2025-05-13 00:51:12 +0000 UTC" firstStartedPulling="2025-05-13 00:51:13.321972777 +0000 UTC m=+41.447005891" lastFinishedPulling="2025-05-13 00:51:18.465843124 +0000 UTC m=+46.590876238" observedRunningTime="2025-05-13 00:51:18.864598703 +0000 UTC m=+46.989631817" watchObservedRunningTime="2025-05-13 00:51:19.000664755 +0000 UTC m=+47.125697869" May 13 00:51:19.319947 kubelet[1596]: E0513 00:51:19.319895 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:51:20.320853 kubelet[1596]: E0513 00:51:20.320836 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:51:21.321160 kubelet[1596]: E0513 00:51:21.321122 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:51:22.322104 kubelet[1596]: E0513 00:51:22.322061 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:51:23.322329 kubelet[1596]: E0513 00:51:23.322265 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:51:24.323129 kubelet[1596]: E0513 00:51:24.323072 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:51:25.324160 kubelet[1596]: E0513 00:51:25.324118 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:51:26.324780 kubelet[1596]: E0513 00:51:26.324737 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:51:27.325216 kubelet[1596]: E0513 00:51:27.325162 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:51:27.791489 kubelet[1596]: I0513 00:51:27.791391 1596 topology_manager.go:215] "Topology Admit Handler" podUID="dc5054a4-fdfc-4c7e-905e-3c034da0da79" podNamespace="default" podName="test-pod-1" May 13 00:51:27.883944 kubelet[1596]: I0513 00:51:27.883893 1596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tw76x\" (UniqueName: \"kubernetes.io/projected/dc5054a4-fdfc-4c7e-905e-3c034da0da79-kube-api-access-tw76x\") pod \"test-pod-1\" (UID: \"dc5054a4-fdfc-4c7e-905e-3c034da0da79\") " pod="default/test-pod-1" May 13 00:51:27.883944 kubelet[1596]: I0513 00:51:27.883929 1596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-a035038f-cf1b-4070-8c16-47f488a60b21\" (UniqueName: \"kubernetes.io/nfs/dc5054a4-fdfc-4c7e-905e-3c034da0da79-pvc-a035038f-cf1b-4070-8c16-47f488a60b21\") pod \"test-pod-1\" (UID: \"dc5054a4-fdfc-4c7e-905e-3c034da0da79\") " pod="default/test-pod-1" May 13 00:51:27.992000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:27.998487 kernel: Failed to create system directory netfs May 13 00:51:27.998530 kernel: audit: type=1400 audit(1747097487.992:360): avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:27.998549 kernel: Failed to create system directory netfs May 13 00:51:27.998570 kernel: audit: type=1400 audit(1747097487.992:360): avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:27.992000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:27.992000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.003099 kernel: Failed to create system directory netfs May 13 00:51:28.003121 kernel: audit: type=1400 audit(1747097487.992:360): avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.003136 kernel: Failed to create system directory netfs May 13 00:51:28.006306 kernel: audit: type=1400 audit(1747097487.992:360): avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:27.992000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:27.992000 audit[3031]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5586824405e0 a1=153bc a2=55866fd1d2b0 a3=5 items=0 ppid=487 pid=3031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:51:27.992000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 13 00:51:28.016860 kernel: audit: type=1300 audit(1747097487.992:360): arch=c000003e syscall=175 success=yes exit=0 a0=5586824405e0 a1=153bc a2=55866fd1d2b0 a3=5 items=0 ppid=487 pid=3031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:51:28.016911 kernel: audit: type=1327 audit(1747097487.992:360): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 13 00:51:28.014000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.017883 kernel: Failed to create system directory fscache May 13 00:51:28.017916 kernel: audit: type=1400 audit(1747097488.014:361): avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.017955 kernel: Failed to create system directory fscache May 13 00:51:28.021047 kernel: audit: type=1400 audit(1747097488.014:361): avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.014000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.024868 kernel: Failed to create system directory fscache May 13 00:51:28.024888 kernel: audit: type=1400 audit(1747097488.014:361): avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.014000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.028746 kernel: Failed to create system directory fscache May 13 00:51:28.028769 kernel: audit: type=1400 audit(1747097488.014:361): avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.014000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.032664 kernel: Failed to create system directory fscache May 13 00:51:28.014000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.014000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.034113 kernel: Failed to create system directory fscache May 13 00:51:28.034131 kernel: Failed to create system directory fscache May 13 00:51:28.014000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.014000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.014000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.036328 kernel: Failed to create system directory fscache May 13 00:51:28.036349 kernel: Failed to create system directory fscache May 13 00:51:28.036364 kernel: Failed to create system directory fscache May 13 00:51:28.014000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.014000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.014000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.038503 kernel: Failed to create system directory fscache May 13 00:51:28.038524 kernel: Failed to create system directory fscache May 13 00:51:28.038536 kernel: Failed to create system directory fscache May 13 00:51:28.014000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.039248 kernel: Failed to create system directory fscache May 13 00:51:28.014000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.014000 audit[3031]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5586826559c0 a1=4c0fc a2=55866fd1d2b0 a3=5 items=0 ppid=487 pid=3031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:51:28.041829 kernel: FS-Cache: Loaded May 13 00:51:28.014000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.071347 kernel: Failed to create system directory sunrpc May 13 00:51:28.071391 kernel: Failed to create system directory sunrpc May 13 00:51:28.071407 kernel: Failed to create system directory sunrpc May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.072065 kernel: Failed to create system directory sunrpc May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.073501 kernel: Failed to create system directory sunrpc May 13 00:51:28.073517 kernel: Failed to create system directory sunrpc May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.074954 kernel: Failed to create system directory sunrpc May 13 00:51:28.074978 kernel: Failed to create system directory sunrpc May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.076390 kernel: Failed to create system directory sunrpc May 13 00:51:28.076411 kernel: Failed to create system directory sunrpc May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.077857 kernel: Failed to create system directory sunrpc May 13 00:51:28.077874 kernel: Failed to create system directory sunrpc May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.079303 kernel: Failed to create system directory sunrpc May 13 00:51:28.079319 kernel: Failed to create system directory sunrpc May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.081504 kernel: Failed to create system directory sunrpc May 13 00:51:28.081535 kernel: Failed to create system directory sunrpc May 13 00:51:28.081550 kernel: Failed to create system directory sunrpc May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.082941 kernel: Failed to create system directory sunrpc May 13 00:51:28.082962 kernel: Failed to create system directory sunrpc May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.084400 kernel: Failed to create system directory sunrpc May 13 00:51:28.084422 kernel: Failed to create system directory sunrpc May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.085845 kernel: Failed to create system directory sunrpc May 13 00:51:28.085876 kernel: Failed to create system directory sunrpc May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.087287 kernel: Failed to create system directory sunrpc May 13 00:51:28.087323 kernel: Failed to create system directory sunrpc May 13 00:51:28.089553 kernel: Failed to create system directory sunrpc May 13 00:51:28.089589 kernel: Failed to create system directory sunrpc May 13 00:51:28.089607 kernel: Failed to create system directory sunrpc May 13 00:51:28.090286 kernel: Failed to create system directory sunrpc May 13 00:51:28.092416 kernel: Failed to create system directory sunrpc May 13 00:51:28.092452 kernel: Failed to create system directory sunrpc May 13 00:51:28.092468 kernel: Failed to create system directory sunrpc May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.093854 kernel: Failed to create system directory sunrpc May 13 00:51:28.093874 kernel: Failed to create system directory sunrpc May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.095441 kernel: Failed to create system directory sunrpc May 13 00:51:28.095475 kernel: Failed to create system directory sunrpc May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.096884 kernel: Failed to create system directory sunrpc May 13 00:51:28.096902 kernel: Failed to create system directory sunrpc May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.098315 kernel: Failed to create system directory sunrpc May 13 00:51:28.098343 kernel: Failed to create system directory sunrpc May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.100470 kernel: Failed to create system directory sunrpc May 13 00:51:28.100500 kernel: Failed to create system directory sunrpc May 13 00:51:28.100513 kernel: Failed to create system directory sunrpc May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.101909 kernel: Failed to create system directory sunrpc May 13 00:51:28.101934 kernel: Failed to create system directory sunrpc May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.103344 kernel: Failed to create system directory sunrpc May 13 00:51:28.103370 kernel: Failed to create system directory sunrpc May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.105489 kernel: Failed to create system directory sunrpc May 13 00:51:28.105510 kernel: Failed to create system directory sunrpc May 13 00:51:28.105524 kernel: Failed to create system directory sunrpc May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.106931 kernel: Failed to create system directory sunrpc May 13 00:51:28.106948 kernel: Failed to create system directory sunrpc May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.108360 kernel: Failed to create system directory sunrpc May 13 00:51:28.108376 kernel: Failed to create system directory sunrpc May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.110516 kernel: Failed to create system directory sunrpc May 13 00:51:28.110546 kernel: Failed to create system directory sunrpc May 13 00:51:28.110560 kernel: Failed to create system directory sunrpc May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.111948 kernel: Failed to create system directory sunrpc May 13 00:51:28.111973 kernel: Failed to create system directory sunrpc May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.113429 kernel: Failed to create system directory sunrpc May 13 00:51:28.113452 kernel: Failed to create system directory sunrpc May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.114906 kernel: Failed to create system directory sunrpc May 13 00:51:28.114928 kernel: Failed to create system directory sunrpc May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.116337 kernel: Failed to create system directory sunrpc May 13 00:51:28.116360 kernel: Failed to create system directory sunrpc May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.118492 kernel: Failed to create system directory sunrpc May 13 00:51:28.118509 kernel: Failed to create system directory sunrpc May 13 00:51:28.118526 kernel: Failed to create system directory sunrpc May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.119934 kernel: Failed to create system directory sunrpc May 13 00:51:28.119988 kernel: Failed to create system directory sunrpc May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.121365 kernel: Failed to create system directory sunrpc May 13 00:51:28.121385 kernel: Failed to create system directory sunrpc May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.123514 kernel: Failed to create system directory sunrpc May 13 00:51:28.123531 kernel: Failed to create system directory sunrpc May 13 00:51:28.123550 kernel: Failed to create system directory sunrpc May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.124959 kernel: Failed to create system directory sunrpc May 13 00:51:28.124980 kernel: Failed to create system directory sunrpc May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.126388 kernel: Failed to create system directory sunrpc May 13 00:51:28.126411 kernel: Failed to create system directory sunrpc May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.127829 kernel: Failed to create system directory sunrpc May 13 00:51:28.127847 kernel: Failed to create system directory sunrpc May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.129256 kernel: Failed to create system directory sunrpc May 13 00:51:28.129273 kernel: Failed to create system directory sunrpc May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.131404 kernel: Failed to create system directory sunrpc May 13 00:51:28.131428 kernel: Failed to create system directory sunrpc May 13 00:51:28.131441 kernel: Failed to create system directory sunrpc May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.132837 kernel: Failed to create system directory sunrpc May 13 00:51:28.132859 kernel: Failed to create system directory sunrpc May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.134261 kernel: Failed to create system directory sunrpc May 13 00:51:28.134277 kernel: Failed to create system directory sunrpc May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.136463 kernel: Failed to create system directory sunrpc May 13 00:51:28.136483 kernel: Failed to create system directory sunrpc May 13 00:51:28.136495 kernel: Failed to create system directory sunrpc May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.137901 kernel: Failed to create system directory sunrpc May 13 00:51:28.137925 kernel: Failed to create system directory sunrpc May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.139339 kernel: Failed to create system directory sunrpc May 13 00:51:28.139370 kernel: Failed to create system directory sunrpc May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.141558 kernel: Failed to create system directory sunrpc May 13 00:51:28.141575 kernel: Failed to create system directory sunrpc May 13 00:51:28.141594 kernel: Failed to create system directory sunrpc May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.143102 kernel: Failed to create system directory sunrpc May 13 00:51:28.143133 kernel: Failed to create system directory sunrpc May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.144529 kernel: Failed to create system directory sunrpc May 13 00:51:28.144550 kernel: Failed to create system directory sunrpc May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.145963 kernel: Failed to create system directory sunrpc May 13 00:51:28.145986 kernel: Failed to create system directory sunrpc May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.147394 kernel: Failed to create system directory sunrpc May 13 00:51:28.147411 kernel: Failed to create system directory sunrpc May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.148833 kernel: Failed to create system directory sunrpc May 13 00:51:28.148851 kernel: Failed to create system directory sunrpc May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.150261 kernel: Failed to create system directory sunrpc May 13 00:51:28.150277 kernel: Failed to create system directory sunrpc May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.152399 kernel: Failed to create system directory sunrpc May 13 00:51:28.152422 kernel: Failed to create system directory sunrpc May 13 00:51:28.152436 kernel: Failed to create system directory sunrpc May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.153830 kernel: Failed to create system directory sunrpc May 13 00:51:28.153851 kernel: Failed to create system directory sunrpc May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.155266 kernel: Failed to create system directory sunrpc May 13 00:51:28.155288 kernel: Failed to create system directory sunrpc May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.157407 kernel: Failed to create system directory sunrpc May 13 00:51:28.157425 kernel: Failed to create system directory sunrpc May 13 00:51:28.157442 kernel: Failed to create system directory sunrpc May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.158846 kernel: Failed to create system directory sunrpc May 13 00:51:28.158863 kernel: Failed to create system directory sunrpc May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.160278 kernel: Failed to create system directory sunrpc May 13 00:51:28.160299 kernel: Failed to create system directory sunrpc May 13 00:51:28.060000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.171267 kernel: RPC: Registered named UNIX socket transport module. May 13 00:51:28.171298 kernel: RPC: Registered udp transport module. May 13 00:51:28.171311 kernel: RPC: Registered tcp transport module. May 13 00:51:28.171333 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. May 13 00:51:28.060000 audit[3031]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5586826a1ad0 a1=1a814c a2=55866fd1d2b0 a3=5 items=6 ppid=487 pid=3031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:51:28.060000 audit: CWD cwd="/" May 13 00:51:28.060000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:51:28.060000 audit: PATH item=1 name=(null) inode=24578 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:51:28.060000 audit: PATH item=2 name=(null) inode=24578 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:51:28.060000 audit: PATH item=3 name=(null) inode=24579 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:51:28.060000 audit: PATH item=4 name=(null) inode=24578 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:51:28.060000 audit: PATH item=5 name=(null) inode=24580 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:51:28.060000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.204836 kernel: Failed to create system directory nfs May 13 00:51:28.204888 kernel: Failed to create system directory nfs May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.206184 kernel: Failed to create system directory nfs May 13 00:51:28.206203 kernel: Failed to create system directory nfs May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.208221 kernel: Failed to create system directory nfs May 13 00:51:28.208245 kernel: Failed to create system directory nfs May 13 00:51:28.208259 kernel: Failed to create system directory nfs May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.210259 kernel: Failed to create system directory nfs May 13 00:51:28.210296 kernel: Failed to create system directory nfs May 13 00:51:28.210310 kernel: Failed to create system directory nfs May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.212287 kernel: Failed to create system directory nfs May 13 00:51:28.212304 kernel: Failed to create system directory nfs May 13 00:51:28.212317 kernel: Failed to create system directory nfs May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.214330 kernel: Failed to create system directory nfs May 13 00:51:28.214352 kernel: Failed to create system directory nfs May 13 00:51:28.214366 kernel: Failed to create system directory nfs May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.216379 kernel: Failed to create system directory nfs May 13 00:51:28.216401 kernel: Failed to create system directory nfs May 13 00:51:28.216414 kernel: Failed to create system directory nfs May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.218428 kernel: Failed to create system directory nfs May 13 00:51:28.218445 kernel: Failed to create system directory nfs May 13 00:51:28.218457 kernel: Failed to create system directory nfs May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.220472 kernel: Failed to create system directory nfs May 13 00:51:28.220509 kernel: Failed to create system directory nfs May 13 00:51:28.220526 kernel: Failed to create system directory nfs May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.221833 kernel: Failed to create system directory nfs May 13 00:51:28.221850 kernel: Failed to create system directory nfs May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.223188 kernel: Failed to create system directory nfs May 13 00:51:28.223206 kernel: Failed to create system directory nfs May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.225228 kernel: Failed to create system directory nfs May 13 00:51:28.225245 kernel: Failed to create system directory nfs May 13 00:51:28.225258 kernel: Failed to create system directory nfs May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.227264 kernel: Failed to create system directory nfs May 13 00:51:28.227281 kernel: Failed to create system directory nfs May 13 00:51:28.227293 kernel: Failed to create system directory nfs May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.229406 kernel: Failed to create system directory nfs May 13 00:51:28.229436 kernel: Failed to create system directory nfs May 13 00:51:28.229450 kernel: Failed to create system directory nfs May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.231447 kernel: Failed to create system directory nfs May 13 00:51:28.231475 kernel: Failed to create system directory nfs May 13 00:51:28.231490 kernel: Failed to create system directory nfs May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.232826 kernel: Failed to create system directory nfs May 13 00:51:28.232848 kernel: Failed to create system directory nfs May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.234172 kernel: Failed to create system directory nfs May 13 00:51:28.234201 kernel: Failed to create system directory nfs May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.236220 kernel: Failed to create system directory nfs May 13 00:51:28.236237 kernel: Failed to create system directory nfs May 13 00:51:28.236250 kernel: Failed to create system directory nfs May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.238264 kernel: Failed to create system directory nfs May 13 00:51:28.238280 kernel: Failed to create system directory nfs May 13 00:51:28.238299 kernel: Failed to create system directory nfs May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.240304 kernel: Failed to create system directory nfs May 13 00:51:28.240325 kernel: Failed to create system directory nfs May 13 00:51:28.240337 kernel: Failed to create system directory nfs May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.242343 kernel: Failed to create system directory nfs May 13 00:51:28.242359 kernel: Failed to create system directory nfs May 13 00:51:28.242379 kernel: Failed to create system directory nfs May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.244383 kernel: Failed to create system directory nfs May 13 00:51:28.244401 kernel: Failed to create system directory nfs May 13 00:51:28.244414 kernel: Failed to create system directory nfs May 13 00:51:28.197000 audit[3031]: AVC avc: denied { confidentiality } for pid=3031 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.197000 audit[3031]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5586828c2a10 a1=16eae4 a2=55866fd1d2b0 a3=5 items=0 ppid=487 pid=3031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:51:28.197000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 13 00:51:28.265844 kernel: FS-Cache: Netfs 'nfs' registered for caching May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.302359 kernel: Failed to create system directory nfs4 May 13 00:51:28.302435 kernel: Failed to create system directory nfs4 May 13 00:51:28.302454 kernel: Failed to create system directory nfs4 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.304867 kernel: Failed to create system directory nfs4 May 13 00:51:28.304893 kernel: Failed to create system directory nfs4 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.306438 kernel: Failed to create system directory nfs4 May 13 00:51:28.306457 kernel: Failed to create system directory nfs4 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.307884 kernel: Failed to create system directory nfs4 May 13 00:51:28.307904 kernel: Failed to create system directory nfs4 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.309266 kernel: Failed to create system directory nfs4 May 13 00:51:28.309290 kernel: Failed to create system directory nfs4 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.311334 kernel: Failed to create system directory nfs4 May 13 00:51:28.311360 kernel: Failed to create system directory nfs4 May 13 00:51:28.311374 kernel: Failed to create system directory nfs4 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.313423 kernel: Failed to create system directory nfs4 May 13 00:51:28.313440 kernel: Failed to create system directory nfs4 May 13 00:51:28.313453 kernel: Failed to create system directory nfs4 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.314840 kernel: Failed to create system directory nfs4 May 13 00:51:28.314875 kernel: Failed to create system directory nfs4 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.316240 kernel: Failed to create system directory nfs4 May 13 00:51:28.316262 kernel: Failed to create system directory nfs4 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.318387 kernel: Failed to create system directory nfs4 May 13 00:51:28.318410 kernel: Failed to create system directory nfs4 May 13 00:51:28.318423 kernel: Failed to create system directory nfs4 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.320500 kernel: Failed to create system directory nfs4 May 13 00:51:28.320537 kernel: Failed to create system directory nfs4 May 13 00:51:28.320552 kernel: Failed to create system directory nfs4 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.321902 kernel: Failed to create system directory nfs4 May 13 00:51:28.321923 kernel: Failed to create system directory nfs4 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.323302 kernel: Failed to create system directory nfs4 May 13 00:51:28.323324 kernel: Failed to create system directory nfs4 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.325418 kernel: Failed to create system directory nfs4 May 13 00:51:28.325449 kernel: Failed to create system directory nfs4 May 13 00:51:28.325463 kernel: Failed to create system directory nfs4 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.325507 kubelet[1596]: E0513 00:51:28.325454 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.326834 kernel: Failed to create system directory nfs4 May 13 00:51:28.326863 kernel: Failed to create system directory nfs4 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.328231 kernel: Failed to create system directory nfs4 May 13 00:51:28.328248 kernel: Failed to create system directory nfs4 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.330358 kernel: Failed to create system directory nfs4 May 13 00:51:28.330395 kernel: Failed to create system directory nfs4 May 13 00:51:28.330413 kernel: Failed to create system directory nfs4 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.332446 kernel: Failed to create system directory nfs4 May 13 00:51:28.332477 kernel: Failed to create system directory nfs4 May 13 00:51:28.332490 kernel: Failed to create system directory nfs4 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.333857 kernel: Failed to create system directory nfs4 May 13 00:51:28.333883 kernel: Failed to create system directory nfs4 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.335252 kernel: Failed to create system directory nfs4 May 13 00:51:28.335278 kernel: Failed to create system directory nfs4 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.337354 kernel: Failed to create system directory nfs4 May 13 00:51:28.337384 kernel: Failed to create system directory nfs4 May 13 00:51:28.337398 kernel: Failed to create system directory nfs4 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.339466 kernel: Failed to create system directory nfs4 May 13 00:51:28.339489 kernel: Failed to create system directory nfs4 May 13 00:51:28.339502 kernel: Failed to create system directory nfs4 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.340864 kernel: Failed to create system directory nfs4 May 13 00:51:28.340886 kernel: Failed to create system directory nfs4 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.342265 kernel: Failed to create system directory nfs4 May 13 00:51:28.342287 kernel: Failed to create system directory nfs4 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.344423 kernel: Failed to create system directory nfs4 May 13 00:51:28.344441 kernel: Failed to create system directory nfs4 May 13 00:51:28.344454 kernel: Failed to create system directory nfs4 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.346499 kernel: Failed to create system directory nfs4 May 13 00:51:28.346519 kernel: Failed to create system directory nfs4 May 13 00:51:28.346533 kernel: Failed to create system directory nfs4 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.347892 kernel: Failed to create system directory nfs4 May 13 00:51:28.347909 kernel: Failed to create system directory nfs4 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.349296 kernel: Failed to create system directory nfs4 May 13 00:51:28.349328 kernel: Failed to create system directory nfs4 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.351378 kernel: Failed to create system directory nfs4 May 13 00:51:28.351400 kernel: Failed to create system directory nfs4 May 13 00:51:28.351414 kernel: Failed to create system directory nfs4 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.353478 kernel: Failed to create system directory nfs4 May 13 00:51:28.353500 kernel: Failed to create system directory nfs4 May 13 00:51:28.353514 kernel: Failed to create system directory nfs4 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.354862 kernel: Failed to create system directory nfs4 May 13 00:51:28.354897 kernel: Failed to create system directory nfs4 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.356257 kernel: Failed to create system directory nfs4 May 13 00:51:28.356290 kernel: Failed to create system directory nfs4 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.358338 kernel: Failed to create system directory nfs4 May 13 00:51:28.358375 kernel: Failed to create system directory nfs4 May 13 00:51:28.358389 kernel: Failed to create system directory nfs4 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.360454 kernel: Failed to create system directory nfs4 May 13 00:51:28.360488 kernel: Failed to create system directory nfs4 May 13 00:51:28.360502 kernel: Failed to create system directory nfs4 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.361863 kernel: Failed to create system directory nfs4 May 13 00:51:28.361886 kernel: Failed to create system directory nfs4 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.363261 kernel: Failed to create system directory nfs4 May 13 00:51:28.363293 kernel: Failed to create system directory nfs4 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.365365 kernel: Failed to create system directory nfs4 May 13 00:51:28.365413 kernel: Failed to create system directory nfs4 May 13 00:51:28.365437 kernel: Failed to create system directory nfs4 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.367460 kernel: Failed to create system directory nfs4 May 13 00:51:28.367483 kernel: Failed to create system directory nfs4 May 13 00:51:28.367504 kernel: Failed to create system directory nfs4 May 13 00:51:28.289000 audit[3036]: AVC avc: denied { confidentiality } for pid=3036 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.501095 kernel: NFS: Registering the id_resolver key type May 13 00:51:28.501130 kernel: Key type id_resolver registered May 13 00:51:28.501143 kernel: Key type id_legacy registered May 13 00:51:28.289000 audit[3036]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f1be63cb010 a1=209404 a2=55d2fe9312b0 a3=5 items=0 ppid=487 pid=3036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:51:28.289000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 May 13 00:51:28.508000 audit[3037]: AVC avc: denied { confidentiality } for pid=3037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.508000 audit[3037]: AVC avc: denied { confidentiality } for pid=3037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.508000 audit[3037]: AVC avc: denied { confidentiality } for pid=3037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.513547 kernel: Failed to create system directory rpcgss May 13 00:51:28.513570 kernel: Failed to create system directory rpcgss May 13 00:51:28.513587 kernel: Failed to create system directory rpcgss May 13 00:51:28.513599 kernel: Failed to create system directory rpcgss May 13 00:51:28.508000 audit[3037]: AVC avc: denied { confidentiality } for pid=3037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.508000 audit[3037]: AVC avc: denied { confidentiality } for pid=3037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.515081 kernel: Failed to create system directory rpcgss May 13 00:51:28.515112 kernel: Failed to create system directory rpcgss May 13 00:51:28.508000 audit[3037]: AVC avc: denied { confidentiality } for pid=3037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.508000 audit[3037]: AVC avc: denied { confidentiality } for pid=3037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.516507 kernel: Failed to create system directory rpcgss May 13 00:51:28.516532 kernel: Failed to create system directory rpcgss May 13 00:51:28.508000 audit[3037]: AVC avc: denied { confidentiality } for pid=3037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.508000 audit[3037]: AVC avc: denied { confidentiality } for pid=3037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.517939 kernel: Failed to create system directory rpcgss May 13 00:51:28.517956 kernel: Failed to create system directory rpcgss May 13 00:51:28.508000 audit[3037]: AVC avc: denied { confidentiality } for pid=3037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.508000 audit[3037]: AVC avc: denied { confidentiality } for pid=3037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.519371 kernel: Failed to create system directory rpcgss May 13 00:51:28.519388 kernel: Failed to create system directory rpcgss May 13 00:51:28.508000 audit[3037]: AVC avc: denied { confidentiality } for pid=3037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.508000 audit[3037]: AVC avc: denied { confidentiality } for pid=3037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.508000 audit[3037]: AVC avc: denied { confidentiality } for pid=3037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.521505 kernel: Failed to create system directory rpcgss May 13 00:51:28.521521 kernel: Failed to create system directory rpcgss May 13 00:51:28.521534 kernel: Failed to create system directory rpcgss May 13 00:51:28.508000 audit[3037]: AVC avc: denied { confidentiality } for pid=3037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.508000 audit[3037]: AVC avc: denied { confidentiality } for pid=3037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.522941 kernel: Failed to create system directory rpcgss May 13 00:51:28.522958 kernel: Failed to create system directory rpcgss May 13 00:51:28.508000 audit[3037]: AVC avc: denied { confidentiality } for pid=3037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.508000 audit[3037]: AVC avc: denied { confidentiality } for pid=3037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.524384 kernel: Failed to create system directory rpcgss May 13 00:51:28.524401 kernel: Failed to create system directory rpcgss May 13 00:51:28.508000 audit[3037]: AVC avc: denied { confidentiality } for pid=3037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.508000 audit[3037]: AVC avc: denied { confidentiality } for pid=3037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.525832 kernel: Failed to create system directory rpcgss May 13 00:51:28.525853 kernel: Failed to create system directory rpcgss May 13 00:51:28.508000 audit[3037]: AVC avc: denied { confidentiality } for pid=3037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.508000 audit[3037]: AVC avc: denied { confidentiality } for pid=3037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.527254 kernel: Failed to create system directory rpcgss May 13 00:51:28.527278 kernel: Failed to create system directory rpcgss May 13 00:51:28.508000 audit[3037]: AVC avc: denied { confidentiality } for pid=3037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.508000 audit[3037]: AVC avc: denied { confidentiality } for pid=3037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.508000 audit[3037]: AVC avc: denied { confidentiality } for pid=3037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.529398 kernel: Failed to create system directory rpcgss May 13 00:51:28.529415 kernel: Failed to create system directory rpcgss May 13 00:51:28.529429 kernel: Failed to create system directory rpcgss May 13 00:51:28.508000 audit[3037]: AVC avc: denied { confidentiality } for pid=3037 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:51:28.508000 audit[3037]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f44ca1d4010 a1=70b64 a2=564768b9c2b0 a3=5 items=0 ppid=487 pid=3037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:51:28.508000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 May 13 00:51:28.541317 nfsidmap[3046]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' May 13 00:51:28.544185 nfsidmap[3049]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' May 13 00:51:28.550000 audit[1390]: AVC avc: denied { watch_reads } for pid=1390 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2572 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 13 00:51:28.550000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2572 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 13 00:51:28.550000 audit[1390]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=55b03dba3c80 a2=10 a3=64e4331d5b8280a5 items=0 ppid=1 pid=1390 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:51:28.550000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2572 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 13 00:51:28.550000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 13 00:51:28.550000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2572 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 13 00:51:28.550000 audit[1390]: AVC avc: denied { watch_reads } for pid=1390 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2572 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 13 00:51:28.550000 audit[1390]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=55b03dba3c80 a2=10 a3=64e4331d5b8280a5 items=0 ppid=1 pid=1390 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:51:28.550000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 13 00:51:28.550000 audit[1390]: AVC avc: denied { watch_reads } for pid=1390 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2572 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 13 00:51:28.550000 audit[1390]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=55b03dba3c80 a2=10 a3=64e4331d5b8280a5 items=0 ppid=1 pid=1390 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:51:28.550000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 13 00:51:28.694722 env[1309]: time="2025-05-13T00:51:28.694688158Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:dc5054a4-fdfc-4c7e-905e-3c034da0da79,Namespace:default,Attempt:0,}" May 13 00:51:28.781430 systemd-networkd[1084]: cali5ec59c6bf6e: Link UP May 13 00:51:28.783643 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 13 00:51:28.783844 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready May 13 00:51:28.783777 systemd-networkd[1084]: cali5ec59c6bf6e: Gained carrier May 13 00:51:28.791600 env[1309]: 2025-05-13 00:51:28.730 [INFO][3052] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.142-k8s-test--pod--1-eth0 default dc5054a4-fdfc-4c7e-905e-3c034da0da79 1183 0 2025-05-13 00:51:13 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.142 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="12897d53c8d1876e55242cb8e4177ee3d0aa4848a97b0f7944c7f73d158f8ebb" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.142-k8s-test--pod--1-" May 13 00:51:28.791600 env[1309]: 2025-05-13 00:51:28.730 [INFO][3052] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="12897d53c8d1876e55242cb8e4177ee3d0aa4848a97b0f7944c7f73d158f8ebb" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.142-k8s-test--pod--1-eth0" May 13 00:51:28.791600 env[1309]: 2025-05-13 00:51:28.750 [INFO][3067] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="12897d53c8d1876e55242cb8e4177ee3d0aa4848a97b0f7944c7f73d158f8ebb" HandleID="k8s-pod-network.12897d53c8d1876e55242cb8e4177ee3d0aa4848a97b0f7944c7f73d158f8ebb" Workload="10.0.0.142-k8s-test--pod--1-eth0" May 13 00:51:28.791600 env[1309]: 2025-05-13 00:51:28.757 [INFO][3067] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="12897d53c8d1876e55242cb8e4177ee3d0aa4848a97b0f7944c7f73d158f8ebb" HandleID="k8s-pod-network.12897d53c8d1876e55242cb8e4177ee3d0aa4848a97b0f7944c7f73d158f8ebb" Workload="10.0.0.142-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00042ea50), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.142", "pod":"test-pod-1", "timestamp":"2025-05-13 00:51:28.750388592 +0000 UTC"}, Hostname:"10.0.0.142", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:51:28.791600 env[1309]: 2025-05-13 00:51:28.757 [INFO][3067] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:51:28.791600 env[1309]: 2025-05-13 00:51:28.757 [INFO][3067] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:51:28.791600 env[1309]: 2025-05-13 00:51:28.757 [INFO][3067] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.142' May 13 00:51:28.791600 env[1309]: 2025-05-13 00:51:28.758 [INFO][3067] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.12897d53c8d1876e55242cb8e4177ee3d0aa4848a97b0f7944c7f73d158f8ebb" host="10.0.0.142" May 13 00:51:28.791600 env[1309]: 2025-05-13 00:51:28.761 [INFO][3067] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.142" May 13 00:51:28.791600 env[1309]: 2025-05-13 00:51:28.764 [INFO][3067] ipam/ipam.go 489: Trying affinity for 192.168.25.128/26 host="10.0.0.142" May 13 00:51:28.791600 env[1309]: 2025-05-13 00:51:28.766 [INFO][3067] ipam/ipam.go 155: Attempting to load block cidr=192.168.25.128/26 host="10.0.0.142" May 13 00:51:28.791600 env[1309]: 2025-05-13 00:51:28.768 [INFO][3067] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.25.128/26 host="10.0.0.142" May 13 00:51:28.791600 env[1309]: 2025-05-13 00:51:28.768 [INFO][3067] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.25.128/26 handle="k8s-pod-network.12897d53c8d1876e55242cb8e4177ee3d0aa4848a97b0f7944c7f73d158f8ebb" host="10.0.0.142" May 13 00:51:28.791600 env[1309]: 2025-05-13 00:51:28.769 [INFO][3067] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.12897d53c8d1876e55242cb8e4177ee3d0aa4848a97b0f7944c7f73d158f8ebb May 13 00:51:28.791600 env[1309]: 2025-05-13 00:51:28.772 [INFO][3067] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.25.128/26 handle="k8s-pod-network.12897d53c8d1876e55242cb8e4177ee3d0aa4848a97b0f7944c7f73d158f8ebb" host="10.0.0.142" May 13 00:51:28.791600 env[1309]: 2025-05-13 00:51:28.777 [INFO][3067] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.25.132/26] block=192.168.25.128/26 handle="k8s-pod-network.12897d53c8d1876e55242cb8e4177ee3d0aa4848a97b0f7944c7f73d158f8ebb" host="10.0.0.142" May 13 00:51:28.791600 env[1309]: 2025-05-13 00:51:28.777 [INFO][3067] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.25.132/26] handle="k8s-pod-network.12897d53c8d1876e55242cb8e4177ee3d0aa4848a97b0f7944c7f73d158f8ebb" host="10.0.0.142" May 13 00:51:28.791600 env[1309]: 2025-05-13 00:51:28.777 [INFO][3067] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:51:28.791600 env[1309]: 2025-05-13 00:51:28.777 [INFO][3067] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.25.132/26] IPv6=[] ContainerID="12897d53c8d1876e55242cb8e4177ee3d0aa4848a97b0f7944c7f73d158f8ebb" HandleID="k8s-pod-network.12897d53c8d1876e55242cb8e4177ee3d0aa4848a97b0f7944c7f73d158f8ebb" Workload="10.0.0.142-k8s-test--pod--1-eth0" May 13 00:51:28.791600 env[1309]: 2025-05-13 00:51:28.778 [INFO][3052] cni-plugin/k8s.go 386: Populated endpoint ContainerID="12897d53c8d1876e55242cb8e4177ee3d0aa4848a97b0f7944c7f73d158f8ebb" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.142-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.142-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"dc5054a4-fdfc-4c7e-905e-3c034da0da79", ResourceVersion:"1183", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 51, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.142", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.25.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:51:28.792291 env[1309]: 2025-05-13 00:51:28.779 [INFO][3052] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.25.132/32] ContainerID="12897d53c8d1876e55242cb8e4177ee3d0aa4848a97b0f7944c7f73d158f8ebb" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.142-k8s-test--pod--1-eth0" May 13 00:51:28.792291 env[1309]: 2025-05-13 00:51:28.779 [INFO][3052] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="12897d53c8d1876e55242cb8e4177ee3d0aa4848a97b0f7944c7f73d158f8ebb" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.142-k8s-test--pod--1-eth0" May 13 00:51:28.792291 env[1309]: 2025-05-13 00:51:28.784 [INFO][3052] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="12897d53c8d1876e55242cb8e4177ee3d0aa4848a97b0f7944c7f73d158f8ebb" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.142-k8s-test--pod--1-eth0" May 13 00:51:28.792291 env[1309]: 2025-05-13 00:51:28.784 [INFO][3052] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="12897d53c8d1876e55242cb8e4177ee3d0aa4848a97b0f7944c7f73d158f8ebb" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.142-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.142-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"dc5054a4-fdfc-4c7e-905e-3c034da0da79", ResourceVersion:"1183", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 51, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.142", ContainerID:"12897d53c8d1876e55242cb8e4177ee3d0aa4848a97b0f7944c7f73d158f8ebb", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.25.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"62:3c:ae:79:6c:cd", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:51:28.792291 env[1309]: 2025-05-13 00:51:28.789 [INFO][3052] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="12897d53c8d1876e55242cb8e4177ee3d0aa4848a97b0f7944c7f73d158f8ebb" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.142-k8s-test--pod--1-eth0" May 13 00:51:28.798000 audit[3090]: NETFILTER_CFG table=filter:92 family=2 entries=38 op=nft_register_chain pid=3090 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:51:28.798000 audit[3090]: SYSCALL arch=c000003e syscall=46 success=yes exit=19400 a0=3 a1=7fff7d3c1920 a2=0 a3=7fff7d3c190c items=0 ppid=2257 pid=3090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:51:28.798000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:51:28.801681 env[1309]: time="2025-05-13T00:51:28.801568843Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:51:28.801681 env[1309]: time="2025-05-13T00:51:28.801610451Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:51:28.801842 env[1309]: time="2025-05-13T00:51:28.801620129Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:51:28.802635 env[1309]: time="2025-05-13T00:51:28.802548689Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/12897d53c8d1876e55242cb8e4177ee3d0aa4848a97b0f7944c7f73d158f8ebb pid=3099 runtime=io.containerd.runc.v2 May 13 00:51:28.823111 systemd-resolved[1225]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:51:28.847616 env[1309]: time="2025-05-13T00:51:28.847468496Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:dc5054a4-fdfc-4c7e-905e-3c034da0da79,Namespace:default,Attempt:0,} returns sandbox id \"12897d53c8d1876e55242cb8e4177ee3d0aa4848a97b0f7944c7f73d158f8ebb\"" May 13 00:51:28.849835 env[1309]: time="2025-05-13T00:51:28.849174108Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 13 00:51:29.325611 kubelet[1596]: E0513 00:51:29.325582 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:51:29.608178 env[1309]: time="2025-05-13T00:51:29.608080633Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:51:29.610035 env[1309]: time="2025-05-13T00:51:29.609999205Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:51:29.611448 env[1309]: time="2025-05-13T00:51:29.611415463Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:51:29.612857 env[1309]: time="2025-05-13T00:51:29.612805560Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:51:29.613383 env[1309]: time="2025-05-13T00:51:29.613352951Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa\"" May 13 00:51:29.615199 env[1309]: time="2025-05-13T00:51:29.615176025Z" level=info msg="CreateContainer within sandbox \"12897d53c8d1876e55242cb8e4177ee3d0aa4848a97b0f7944c7f73d158f8ebb\" for container &ContainerMetadata{Name:test,Attempt:0,}" May 13 00:51:29.630888 env[1309]: time="2025-05-13T00:51:29.630850543Z" level=info msg="CreateContainer within sandbox \"12897d53c8d1876e55242cb8e4177ee3d0aa4848a97b0f7944c7f73d158f8ebb\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"65f9e42fcc404f7fd07792ae9ba08457649adcf75b8cc0f93118d8c75dcc98a2\"" May 13 00:51:29.631286 env[1309]: time="2025-05-13T00:51:29.631248833Z" level=info msg="StartContainer for \"65f9e42fcc404f7fd07792ae9ba08457649adcf75b8cc0f93118d8c75dcc98a2\"" May 13 00:51:29.664133 env[1309]: time="2025-05-13T00:51:29.664095411Z" level=info msg="StartContainer for \"65f9e42fcc404f7fd07792ae9ba08457649adcf75b8cc0f93118d8c75dcc98a2\" returns successfully" May 13 00:51:29.878597 kubelet[1596]: I0513 00:51:29.878473 1596 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=16.112931946 podStartE2EDuration="16.878455992s" podCreationTimestamp="2025-05-13 00:51:13 +0000 UTC" firstStartedPulling="2025-05-13 00:51:28.848697952 +0000 UTC m=+56.973731066" lastFinishedPulling="2025-05-13 00:51:29.614221998 +0000 UTC m=+57.739255112" observedRunningTime="2025-05-13 00:51:29.878162309 +0000 UTC m=+58.003195433" watchObservedRunningTime="2025-05-13 00:51:29.878455992 +0000 UTC m=+58.003489106" May 13 00:51:30.326152 kubelet[1596]: E0513 00:51:30.326106 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:51:30.724005 systemd-networkd[1084]: cali5ec59c6bf6e: Gained IPv6LL May 13 00:51:31.326828 kubelet[1596]: E0513 00:51:31.326790 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:51:32.285890 kubelet[1596]: E0513 00:51:32.285861 1596 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:51:32.316305 env[1309]: time="2025-05-13T00:51:32.316273707Z" level=info msg="StopPodSandbox for \"26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f\"" May 13 00:51:32.327491 kubelet[1596]: E0513 00:51:32.327450 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:51:32.371369 env[1309]: 2025-05-13 00:51:32.346 [WARNING][3202] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.142-k8s-csi--node--driver--jgsmr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a5a07571-4660-42ee-a93f-618103603d07", ResourceVersion:"1098", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 50, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.142", ContainerID:"d21dd8e5b23bdf0666ff073fb6d5feb38a65c80d6f3dcf15a4f851b9b5094b84", Pod:"csi-node-driver-jgsmr", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.25.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali819e5919834", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:51:32.371369 env[1309]: 2025-05-13 00:51:32.347 [INFO][3202] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f" May 13 00:51:32.371369 env[1309]: 2025-05-13 00:51:32.347 [INFO][3202] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f" iface="eth0" netns="" May 13 00:51:32.371369 env[1309]: 2025-05-13 00:51:32.347 [INFO][3202] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f" May 13 00:51:32.371369 env[1309]: 2025-05-13 00:51:32.347 [INFO][3202] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f" May 13 00:51:32.371369 env[1309]: 2025-05-13 00:51:32.363 [INFO][3210] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f" HandleID="k8s-pod-network.26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f" Workload="10.0.0.142-k8s-csi--node--driver--jgsmr-eth0" May 13 00:51:32.371369 env[1309]: 2025-05-13 00:51:32.363 [INFO][3210] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:51:32.371369 env[1309]: 2025-05-13 00:51:32.364 [INFO][3210] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:51:32.371369 env[1309]: 2025-05-13 00:51:32.368 [WARNING][3210] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f" HandleID="k8s-pod-network.26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f" Workload="10.0.0.142-k8s-csi--node--driver--jgsmr-eth0" May 13 00:51:32.371369 env[1309]: 2025-05-13 00:51:32.368 [INFO][3210] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f" HandleID="k8s-pod-network.26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f" Workload="10.0.0.142-k8s-csi--node--driver--jgsmr-eth0" May 13 00:51:32.371369 env[1309]: 2025-05-13 00:51:32.369 [INFO][3210] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:51:32.371369 env[1309]: 2025-05-13 00:51:32.370 [INFO][3202] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f" May 13 00:51:32.371829 env[1309]: time="2025-05-13T00:51:32.371380663Z" level=info msg="TearDown network for sandbox \"26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f\" successfully" May 13 00:51:32.371829 env[1309]: time="2025-05-13T00:51:32.371408095Z" level=info msg="StopPodSandbox for \"26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f\" returns successfully" May 13 00:51:32.371936 env[1309]: time="2025-05-13T00:51:32.371901954Z" level=info msg="RemovePodSandbox for \"26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f\"" May 13 00:51:32.371967 env[1309]: time="2025-05-13T00:51:32.371939003Z" level=info msg="Forcibly stopping sandbox \"26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f\"" May 13 00:51:32.423156 env[1309]: 2025-05-13 00:51:32.398 [WARNING][3233] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.142-k8s-csi--node--driver--jgsmr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a5a07571-4660-42ee-a93f-618103603d07", ResourceVersion:"1098", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 50, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.142", ContainerID:"d21dd8e5b23bdf0666ff073fb6d5feb38a65c80d6f3dcf15a4f851b9b5094b84", Pod:"csi-node-driver-jgsmr", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.25.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali819e5919834", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:51:32.423156 env[1309]: 2025-05-13 00:51:32.398 [INFO][3233] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f" May 13 00:51:32.423156 env[1309]: 2025-05-13 00:51:32.398 [INFO][3233] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f" iface="eth0" netns="" May 13 00:51:32.423156 env[1309]: 2025-05-13 00:51:32.398 [INFO][3233] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f" May 13 00:51:32.423156 env[1309]: 2025-05-13 00:51:32.398 [INFO][3233] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f" May 13 00:51:32.423156 env[1309]: 2025-05-13 00:51:32.414 [INFO][3242] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f" HandleID="k8s-pod-network.26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f" Workload="10.0.0.142-k8s-csi--node--driver--jgsmr-eth0" May 13 00:51:32.423156 env[1309]: 2025-05-13 00:51:32.415 [INFO][3242] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:51:32.423156 env[1309]: 2025-05-13 00:51:32.415 [INFO][3242] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:51:32.423156 env[1309]: 2025-05-13 00:51:32.420 [WARNING][3242] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f" HandleID="k8s-pod-network.26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f" Workload="10.0.0.142-k8s-csi--node--driver--jgsmr-eth0" May 13 00:51:32.423156 env[1309]: 2025-05-13 00:51:32.420 [INFO][3242] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f" HandleID="k8s-pod-network.26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f" Workload="10.0.0.142-k8s-csi--node--driver--jgsmr-eth0" May 13 00:51:32.423156 env[1309]: 2025-05-13 00:51:32.421 [INFO][3242] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:51:32.423156 env[1309]: 2025-05-13 00:51:32.422 [INFO][3233] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f" May 13 00:51:32.423591 env[1309]: time="2025-05-13T00:51:32.423182519Z" level=info msg="TearDown network for sandbox \"26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f\" successfully" May 13 00:51:32.426580 env[1309]: time="2025-05-13T00:51:32.426542352Z" level=info msg="RemovePodSandbox \"26a5b02c7613292833c75dc7dfd42dc630f7b0fed74ef56f44e30ab828b16e9f\" returns successfully" May 13 00:51:32.426985 env[1309]: time="2025-05-13T00:51:32.426964757Z" level=info msg="StopPodSandbox for \"dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0\"" May 13 00:51:32.475879 env[1309]: 2025-05-13 00:51:32.452 [WARNING][3265] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.142-k8s-nginx--deployment--85f456d6dd--jppp2-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"f5ee848a-452f-46a5-af6c-814792531001", ResourceVersion:"1078", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 50, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.142", ContainerID:"d9522d2ed99dc4f0e07e48778d56d3e8f5d6bd76298e9e0c8cf018dfe636ea38", Pod:"nginx-deployment-85f456d6dd-jppp2", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.25.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"caliab46855d29e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:51:32.475879 env[1309]: 2025-05-13 00:51:32.452 [INFO][3265] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0" May 13 00:51:32.475879 env[1309]: 2025-05-13 00:51:32.452 [INFO][3265] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0" iface="eth0" netns="" May 13 00:51:32.475879 env[1309]: 2025-05-13 00:51:32.452 [INFO][3265] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0" May 13 00:51:32.475879 env[1309]: 2025-05-13 00:51:32.452 [INFO][3265] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0" May 13 00:51:32.475879 env[1309]: 2025-05-13 00:51:32.468 [INFO][3273] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0" HandleID="k8s-pod-network.dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0" Workload="10.0.0.142-k8s-nginx--deployment--85f456d6dd--jppp2-eth0" May 13 00:51:32.475879 env[1309]: 2025-05-13 00:51:32.468 [INFO][3273] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:51:32.475879 env[1309]: 2025-05-13 00:51:32.468 [INFO][3273] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:51:32.475879 env[1309]: 2025-05-13 00:51:32.472 [WARNING][3273] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0" HandleID="k8s-pod-network.dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0" Workload="10.0.0.142-k8s-nginx--deployment--85f456d6dd--jppp2-eth0" May 13 00:51:32.475879 env[1309]: 2025-05-13 00:51:32.473 [INFO][3273] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0" HandleID="k8s-pod-network.dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0" Workload="10.0.0.142-k8s-nginx--deployment--85f456d6dd--jppp2-eth0" May 13 00:51:32.475879 env[1309]: 2025-05-13 00:51:32.474 [INFO][3273] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:51:32.475879 env[1309]: 2025-05-13 00:51:32.474 [INFO][3265] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0" May 13 00:51:32.476339 env[1309]: time="2025-05-13T00:51:32.475891042Z" level=info msg="TearDown network for sandbox \"dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0\" successfully" May 13 00:51:32.476339 env[1309]: time="2025-05-13T00:51:32.475917772Z" level=info msg="StopPodSandbox for \"dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0\" returns successfully" May 13 00:51:32.476426 env[1309]: time="2025-05-13T00:51:32.476399108Z" level=info msg="RemovePodSandbox for \"dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0\"" May 13 00:51:32.476467 env[1309]: time="2025-05-13T00:51:32.476435807Z" level=info msg="Forcibly stopping sandbox \"dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0\"" May 13 00:51:32.524183 env[1309]: 2025-05-13 00:51:32.501 [WARNING][3297] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.142-k8s-nginx--deployment--85f456d6dd--jppp2-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"f5ee848a-452f-46a5-af6c-814792531001", ResourceVersion:"1078", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 50, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.142", ContainerID:"d9522d2ed99dc4f0e07e48778d56d3e8f5d6bd76298e9e0c8cf018dfe636ea38", Pod:"nginx-deployment-85f456d6dd-jppp2", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.25.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"caliab46855d29e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:51:32.524183 env[1309]: 2025-05-13 00:51:32.502 [INFO][3297] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0" May 13 00:51:32.524183 env[1309]: 2025-05-13 00:51:32.502 [INFO][3297] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0" iface="eth0" netns="" May 13 00:51:32.524183 env[1309]: 2025-05-13 00:51:32.502 [INFO][3297] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0" May 13 00:51:32.524183 env[1309]: 2025-05-13 00:51:32.502 [INFO][3297] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0" May 13 00:51:32.524183 env[1309]: 2025-05-13 00:51:32.516 [INFO][3306] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0" HandleID="k8s-pod-network.dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0" Workload="10.0.0.142-k8s-nginx--deployment--85f456d6dd--jppp2-eth0" May 13 00:51:32.524183 env[1309]: 2025-05-13 00:51:32.516 [INFO][3306] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:51:32.524183 env[1309]: 2025-05-13 00:51:32.516 [INFO][3306] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:51:32.524183 env[1309]: 2025-05-13 00:51:32.521 [WARNING][3306] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0" HandleID="k8s-pod-network.dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0" Workload="10.0.0.142-k8s-nginx--deployment--85f456d6dd--jppp2-eth0" May 13 00:51:32.524183 env[1309]: 2025-05-13 00:51:32.521 [INFO][3306] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0" HandleID="k8s-pod-network.dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0" Workload="10.0.0.142-k8s-nginx--deployment--85f456d6dd--jppp2-eth0" May 13 00:51:32.524183 env[1309]: 2025-05-13 00:51:32.522 [INFO][3306] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:51:32.524183 env[1309]: 2025-05-13 00:51:32.523 [INFO][3297] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0" May 13 00:51:32.524626 env[1309]: time="2025-05-13T00:51:32.524189595Z" level=info msg="TearDown network for sandbox \"dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0\" successfully" May 13 00:51:32.527170 env[1309]: time="2025-05-13T00:51:32.527134557Z" level=info msg="RemovePodSandbox \"dc34c7ab0988395717b394383ea80486ad64ab39adb6ae1a76f07160157584d0\" returns successfully" May 13 00:51:33.328272 kubelet[1596]: E0513 00:51:33.328239 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:51:34.329362 kubelet[1596]: E0513 00:51:34.329323 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 00:51:35.329975 kubelet[1596]: E0513 00:51:35.329927 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"