May 15 09:22:35.951837 kernel: Linux version 5.15.181-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Wed May 14 23:14:51 -00 2025 May 15 09:22:35.951885 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=bd2e5c4f6706621ae2eebb207adba6951c52e019661e3e87d19fb6c7284acf54 May 15 09:22:35.951909 kernel: BIOS-provided physical RAM map: May 15 09:22:35.951931 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable May 15 09:22:35.951948 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved May 15 09:22:35.951964 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved May 15 09:22:35.951983 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bffdcfff] usable May 15 09:22:35.952000 kernel: BIOS-e820: [mem 0x00000000bffdd000-0x00000000bfffffff] reserved May 15 09:22:35.952016 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved May 15 09:22:35.952032 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved May 15 09:22:35.952048 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000013fffffff] usable May 15 09:22:35.952064 kernel: BIOS-e820: [mem 0x000000fd00000000-0x000000ffffffffff] reserved May 15 09:22:35.952168 kernel: NX (Execute Disable) protection: active May 15 09:22:35.952191 kernel: SMBIOS 3.0.0 present. May 15 09:22:35.952211 kernel: DMI: OpenStack Foundation OpenStack Nova, BIOS 1.16.3-debian-1.16.3-2 04/01/2014 May 15 09:22:35.952229 kernel: Hypervisor detected: KVM May 15 09:22:35.952246 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 15 09:22:35.952263 kernel: kvm-clock: cpu 0, msr 10d196001, primary cpu clock May 15 09:22:35.952286 kernel: kvm-clock: using sched offset of 3995551611 cycles May 15 09:22:35.952305 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 15 09:22:35.952323 kernel: tsc: Detected 1996.249 MHz processor May 15 09:22:35.952341 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 15 09:22:35.952360 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 15 09:22:35.952378 kernel: last_pfn = 0x140000 max_arch_pfn = 0x400000000 May 15 09:22:35.952397 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 15 09:22:35.952414 kernel: last_pfn = 0xbffdd max_arch_pfn = 0x400000000 May 15 09:22:35.952432 kernel: ACPI: Early table checksum verification disabled May 15 09:22:35.952454 kernel: ACPI: RSDP 0x00000000000F51E0 000014 (v00 BOCHS ) May 15 09:22:35.952472 kernel: ACPI: RSDT 0x00000000BFFE1B65 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 09:22:35.952490 kernel: ACPI: FACP 0x00000000BFFE1A49 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 09:22:35.952508 kernel: ACPI: DSDT 0x00000000BFFE0040 001A09 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 09:22:35.952526 kernel: ACPI: FACS 0x00000000BFFE0000 000040 May 15 09:22:35.952544 kernel: ACPI: APIC 0x00000000BFFE1ABD 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 15 09:22:35.952561 kernel: ACPI: WAET 0x00000000BFFE1B3D 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 09:22:35.952579 kernel: ACPI: Reserving FACP table memory at [mem 0xbffe1a49-0xbffe1abc] May 15 09:22:35.952600 kernel: ACPI: Reserving DSDT table memory at [mem 0xbffe0040-0xbffe1a48] May 15 09:22:35.952618 kernel: ACPI: Reserving FACS table memory at [mem 0xbffe0000-0xbffe003f] May 15 09:22:35.952635 kernel: ACPI: Reserving APIC table memory at [mem 0xbffe1abd-0xbffe1b3c] May 15 09:22:35.952653 kernel: ACPI: Reserving WAET table memory at [mem 0xbffe1b3d-0xbffe1b64] May 15 09:22:35.952671 kernel: No NUMA configuration found May 15 09:22:35.952696 kernel: Faking a node at [mem 0x0000000000000000-0x000000013fffffff] May 15 09:22:35.952714 kernel: NODE_DATA(0) allocated [mem 0x13fffa000-0x13fffffff] May 15 09:22:35.952736 kernel: Zone ranges: May 15 09:22:35.952755 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 15 09:22:35.952774 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] May 15 09:22:35.952792 kernel: Normal [mem 0x0000000100000000-0x000000013fffffff] May 15 09:22:35.952811 kernel: Movable zone start for each node May 15 09:22:35.952829 kernel: Early memory node ranges May 15 09:22:35.952847 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] May 15 09:22:35.952866 kernel: node 0: [mem 0x0000000000100000-0x00000000bffdcfff] May 15 09:22:35.952887 kernel: node 0: [mem 0x0000000100000000-0x000000013fffffff] May 15 09:22:35.952906 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000013fffffff] May 15 09:22:35.952925 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 15 09:22:35.952943 kernel: On node 0, zone DMA: 97 pages in unavailable ranges May 15 09:22:35.952962 kernel: On node 0, zone Normal: 35 pages in unavailable ranges May 15 09:22:35.952981 kernel: ACPI: PM-Timer IO Port: 0x608 May 15 09:22:35.953000 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 15 09:22:35.953018 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 May 15 09:22:35.953037 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) May 15 09:22:35.953060 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 15 09:22:35.953079 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 15 09:22:35.953124 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 15 09:22:35.953143 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 15 09:22:35.953162 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 15 09:22:35.953180 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs May 15 09:22:35.953199 kernel: [mem 0xc0000000-0xfeffbfff] available for PCI devices May 15 09:22:35.953217 kernel: Booting paravirtualized kernel on KVM May 15 09:22:35.953236 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 15 09:22:35.953260 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 May 15 09:22:35.953279 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 May 15 09:22:35.953297 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 May 15 09:22:35.953315 kernel: pcpu-alloc: [0] 0 1 May 15 09:22:35.953333 kernel: kvm-guest: stealtime: cpu 0, msr 13bc1c0c0 May 15 09:22:35.953352 kernel: kvm-guest: PV spinlocks disabled, no host support May 15 09:22:35.953371 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1031901 May 15 09:22:35.953389 kernel: Policy zone: Normal May 15 09:22:35.953411 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=bd2e5c4f6706621ae2eebb207adba6951c52e019661e3e87d19fb6c7284acf54 May 15 09:22:35.953436 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 15 09:22:35.953454 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 15 09:22:35.953473 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 15 09:22:35.953492 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 15 09:22:35.953511 kernel: Memory: 3968288K/4193772K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47456K init, 4124K bss, 225224K reserved, 0K cma-reserved) May 15 09:22:35.953530 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 May 15 09:22:35.953549 kernel: ftrace: allocating 34584 entries in 136 pages May 15 09:22:35.953567 kernel: ftrace: allocated 136 pages with 2 groups May 15 09:22:35.953589 kernel: rcu: Hierarchical RCU implementation. May 15 09:22:35.953608 kernel: rcu: RCU event tracing is enabled. May 15 09:22:35.953628 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. May 15 09:22:35.953647 kernel: Rude variant of Tasks RCU enabled. May 15 09:22:35.953666 kernel: Tracing variant of Tasks RCU enabled. May 15 09:22:35.953685 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 15 09:22:35.953703 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 May 15 09:22:35.953722 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 May 15 09:22:35.953740 kernel: Console: colour VGA+ 80x25 May 15 09:22:35.953763 kernel: printk: console [tty0] enabled May 15 09:22:35.953781 kernel: printk: console [ttyS0] enabled May 15 09:22:35.953833 kernel: ACPI: Core revision 20210730 May 15 09:22:35.953852 kernel: APIC: Switch to symmetric I/O mode setup May 15 09:22:35.953871 kernel: x2apic enabled May 15 09:22:35.953889 kernel: Switched APIC routing to physical x2apic. May 15 09:22:35.953908 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 15 09:22:35.953927 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized May 15 09:22:35.953946 kernel: Calibrating delay loop (skipped) preset value.. 3992.49 BogoMIPS (lpj=1996249) May 15 09:22:35.953969 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 May 15 09:22:35.953988 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 May 15 09:22:35.954006 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 15 09:22:35.954025 kernel: Spectre V2 : Mitigation: Retpolines May 15 09:22:35.954044 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 15 09:22:35.954063 kernel: Speculative Store Bypass: Vulnerable May 15 09:22:35.954081 kernel: x86/fpu: x87 FPU will use FXSAVE May 15 09:22:35.954123 kernel: Freeing SMP alternatives memory: 32K May 15 09:22:35.954142 kernel: pid_max: default: 32768 minimum: 301 May 15 09:22:35.954164 kernel: LSM: Security Framework initializing May 15 09:22:35.954183 kernel: SELinux: Initializing. May 15 09:22:35.954201 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 15 09:22:35.954220 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 15 09:22:35.954239 kernel: smpboot: CPU0: AMD Intel Core i7 9xx (Nehalem Class Core i7) (family: 0x6, model: 0x1a, stepping: 0x3) May 15 09:22:35.954258 kernel: Performance Events: AMD PMU driver. May 15 09:22:35.954288 kernel: ... version: 0 May 15 09:22:35.954310 kernel: ... bit width: 48 May 15 09:22:35.954329 kernel: ... generic registers: 4 May 15 09:22:35.954348 kernel: ... value mask: 0000ffffffffffff May 15 09:22:35.954393 kernel: ... max period: 00007fffffffffff May 15 09:22:35.954413 kernel: ... fixed-purpose events: 0 May 15 09:22:35.954436 kernel: ... event mask: 000000000000000f May 15 09:22:35.954455 kernel: signal: max sigframe size: 1440 May 15 09:22:35.954475 kernel: rcu: Hierarchical SRCU implementation. May 15 09:22:35.954494 kernel: smp: Bringing up secondary CPUs ... May 15 09:22:35.954513 kernel: x86: Booting SMP configuration: May 15 09:22:35.954535 kernel: .... node #0, CPUs: #1 May 15 09:22:35.954554 kernel: kvm-clock: cpu 1, msr 10d196041, secondary cpu clock May 15 09:22:35.954574 kernel: kvm-guest: stealtime: cpu 1, msr 13bd1c0c0 May 15 09:22:35.954593 kernel: smp: Brought up 1 node, 2 CPUs May 15 09:22:35.954612 kernel: smpboot: Max logical packages: 2 May 15 09:22:35.954632 kernel: smpboot: Total of 2 processors activated (7984.99 BogoMIPS) May 15 09:22:35.954651 kernel: devtmpfs: initialized May 15 09:22:35.954670 kernel: x86/mm: Memory block size: 128MB May 15 09:22:35.954690 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 15 09:22:35.954713 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) May 15 09:22:35.954732 kernel: pinctrl core: initialized pinctrl subsystem May 15 09:22:35.954752 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 15 09:22:35.954771 kernel: audit: initializing netlink subsys (disabled) May 15 09:22:35.954791 kernel: audit: type=2000 audit(1747300955.243:1): state=initialized audit_enabled=0 res=1 May 15 09:22:35.954810 kernel: thermal_sys: Registered thermal governor 'step_wise' May 15 09:22:35.954829 kernel: thermal_sys: Registered thermal governor 'user_space' May 15 09:22:35.954848 kernel: cpuidle: using governor menu May 15 09:22:35.954868 kernel: ACPI: bus type PCI registered May 15 09:22:35.954890 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 15 09:22:35.954910 kernel: dca service started, version 1.12.1 May 15 09:22:35.954929 kernel: PCI: Using configuration type 1 for base access May 15 09:22:35.954949 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 15 09:22:35.954966 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 15 09:22:35.954981 kernel: ACPI: Added _OSI(Module Device) May 15 09:22:35.954995 kernel: ACPI: Added _OSI(Processor Device) May 15 09:22:35.955010 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 15 09:22:35.955024 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 15 09:22:35.955041 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 15 09:22:35.955056 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 15 09:22:35.955070 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 15 09:22:35.955102 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 15 09:22:35.955117 kernel: ACPI: Interpreter enabled May 15 09:22:35.955132 kernel: ACPI: PM: (supports S0 S3 S5) May 15 09:22:35.955146 kernel: ACPI: Using IOAPIC for interrupt routing May 15 09:22:35.955161 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 15 09:22:35.955176 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F May 15 09:22:35.955193 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 15 09:22:35.955431 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] May 15 09:22:35.955590 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. May 15 09:22:35.955613 kernel: acpiphp: Slot [3] registered May 15 09:22:35.955628 kernel: acpiphp: Slot [4] registered May 15 09:22:35.955643 kernel: acpiphp: Slot [5] registered May 15 09:22:35.955658 kernel: acpiphp: Slot [6] registered May 15 09:22:35.955672 kernel: acpiphp: Slot [7] registered May 15 09:22:35.955692 kernel: acpiphp: Slot [8] registered May 15 09:22:35.955707 kernel: acpiphp: Slot [9] registered May 15 09:22:35.955721 kernel: acpiphp: Slot [10] registered May 15 09:22:35.955736 kernel: acpiphp: Slot [11] registered May 15 09:22:35.955750 kernel: acpiphp: Slot [12] registered May 15 09:22:35.955764 kernel: acpiphp: Slot [13] registered May 15 09:22:35.955779 kernel: acpiphp: Slot [14] registered May 15 09:22:35.955794 kernel: acpiphp: Slot [15] registered May 15 09:22:35.955808 kernel: acpiphp: Slot [16] registered May 15 09:22:35.955825 kernel: acpiphp: Slot [17] registered May 15 09:22:35.955839 kernel: acpiphp: Slot [18] registered May 15 09:22:35.955854 kernel: acpiphp: Slot [19] registered May 15 09:22:35.955868 kernel: acpiphp: Slot [20] registered May 15 09:22:35.955883 kernel: acpiphp: Slot [21] registered May 15 09:22:35.955897 kernel: acpiphp: Slot [22] registered May 15 09:22:35.955911 kernel: acpiphp: Slot [23] registered May 15 09:22:35.955926 kernel: acpiphp: Slot [24] registered May 15 09:22:35.955940 kernel: acpiphp: Slot [25] registered May 15 09:22:35.955955 kernel: acpiphp: Slot [26] registered May 15 09:22:35.955971 kernel: acpiphp: Slot [27] registered May 15 09:22:35.955986 kernel: acpiphp: Slot [28] registered May 15 09:22:35.956001 kernel: acpiphp: Slot [29] registered May 15 09:22:35.956015 kernel: acpiphp: Slot [30] registered May 15 09:22:35.956029 kernel: acpiphp: Slot [31] registered May 15 09:22:35.956044 kernel: PCI host bridge to bus 0000:00 May 15 09:22:35.959734 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 15 09:22:35.959813 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 15 09:22:35.959890 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 15 09:22:35.959961 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] May 15 09:22:35.960033 kernel: pci_bus 0000:00: root bus resource [mem 0xc000000000-0xc07fffffff window] May 15 09:22:35.960129 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 15 09:22:35.960226 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 May 15 09:22:35.960319 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 May 15 09:22:35.960414 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 May 15 09:22:35.960497 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc120-0xc12f] May 15 09:22:35.960580 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] May 15 09:22:35.960661 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] May 15 09:22:35.960743 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] May 15 09:22:35.960824 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] May 15 09:22:35.960911 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 May 15 09:22:35.960997 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI May 15 09:22:35.961078 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB May 15 09:22:35.961187 kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 May 15 09:22:35.961271 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] May 15 09:22:35.961356 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xc000000000-0xc000003fff 64bit pref] May 15 09:22:35.961439 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfeb90000-0xfeb90fff] May 15 09:22:35.961519 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfeb80000-0xfeb8ffff pref] May 15 09:22:35.961605 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 15 09:22:35.961701 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 May 15 09:22:35.961784 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc080-0xc0bf] May 15 09:22:35.961865 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfeb91000-0xfeb91fff] May 15 09:22:35.961945 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xc000004000-0xc000007fff 64bit pref] May 15 09:22:35.962026 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfeb00000-0xfeb7ffff pref] May 15 09:22:35.962130 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 May 15 09:22:35.962219 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] May 15 09:22:35.962299 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfeb92000-0xfeb92fff] May 15 09:22:35.962392 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xc000008000-0xc00000bfff 64bit pref] May 15 09:22:35.962481 kernel: pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 May 15 09:22:35.962562 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc0c0-0xc0ff] May 15 09:22:35.962644 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xc00000c000-0xc00000ffff 64bit pref] May 15 09:22:35.962738 kernel: pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 May 15 09:22:35.962822 kernel: pci 0000:00:06.0: reg 0x10: [io 0xc100-0xc11f] May 15 09:22:35.962903 kernel: pci 0000:00:06.0: reg 0x14: [mem 0xfeb93000-0xfeb93fff] May 15 09:22:35.962983 kernel: pci 0000:00:06.0: reg 0x20: [mem 0xc000010000-0xc000013fff 64bit pref] May 15 09:22:35.962995 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 15 09:22:35.963003 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 15 09:22:35.963011 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 15 09:22:35.963019 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 15 09:22:35.963029 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 May 15 09:22:35.963037 kernel: iommu: Default domain type: Translated May 15 09:22:35.963045 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 15 09:22:35.963144 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device May 15 09:22:35.963227 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 15 09:22:35.963309 kernel: pci 0000:00:02.0: vgaarb: bridge control possible May 15 09:22:35.963321 kernel: vgaarb: loaded May 15 09:22:35.963329 kernel: pps_core: LinuxPPS API ver. 1 registered May 15 09:22:35.963338 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 15 09:22:35.963348 kernel: PTP clock support registered May 15 09:22:35.963356 kernel: PCI: Using ACPI for IRQ routing May 15 09:22:35.963364 kernel: PCI: pci_cache_line_size set to 64 bytes May 15 09:22:35.963372 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] May 15 09:22:35.963380 kernel: e820: reserve RAM buffer [mem 0xbffdd000-0xbfffffff] May 15 09:22:35.963387 kernel: clocksource: Switched to clocksource kvm-clock May 15 09:22:35.963395 kernel: VFS: Disk quotas dquot_6.6.0 May 15 09:22:35.963403 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 15 09:22:35.963411 kernel: pnp: PnP ACPI init May 15 09:22:35.963495 kernel: pnp 00:03: [dma 2] May 15 09:22:35.963508 kernel: pnp: PnP ACPI: found 5 devices May 15 09:22:35.963516 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 15 09:22:35.963524 kernel: NET: Registered PF_INET protocol family May 15 09:22:35.963532 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 15 09:22:35.963541 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 15 09:22:35.963549 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 15 09:22:35.963557 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 15 09:22:35.963567 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 15 09:22:35.963575 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 15 09:22:35.963583 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 15 09:22:35.963591 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 15 09:22:35.963599 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 15 09:22:35.963607 kernel: NET: Registered PF_XDP protocol family May 15 09:22:35.963678 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 15 09:22:35.963750 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 15 09:22:35.963820 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 15 09:22:35.963894 kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfffff window] May 15 09:22:35.963965 kernel: pci_bus 0000:00: resource 8 [mem 0xc000000000-0xc07fffffff window] May 15 09:22:35.964047 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release May 15 09:22:35.964149 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers May 15 09:22:35.964230 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds May 15 09:22:35.964242 kernel: PCI: CLS 0 bytes, default 64 May 15 09:22:35.964250 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) May 15 09:22:35.964258 kernel: software IO TLB: mapped [mem 0x00000000bbfdd000-0x00000000bffdd000] (64MB) May 15 09:22:35.964269 kernel: Initialise system trusted keyrings May 15 09:22:35.964277 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 15 09:22:35.964285 kernel: Key type asymmetric registered May 15 09:22:35.964293 kernel: Asymmetric key parser 'x509' registered May 15 09:22:35.964301 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 15 09:22:35.964309 kernel: io scheduler mq-deadline registered May 15 09:22:35.964317 kernel: io scheduler kyber registered May 15 09:22:35.964324 kernel: io scheduler bfq registered May 15 09:22:35.964332 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 15 09:22:35.964342 kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 May 15 09:22:35.964351 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 May 15 09:22:35.964359 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 May 15 09:22:35.964367 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 May 15 09:22:35.964374 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 15 09:22:35.964382 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 15 09:22:35.964390 kernel: random: crng init done May 15 09:22:35.964398 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 15 09:22:35.964406 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 15 09:22:35.964416 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 15 09:22:35.964424 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 15 09:22:35.964505 kernel: rtc_cmos 00:04: RTC can wake from S4 May 15 09:22:35.964580 kernel: rtc_cmos 00:04: registered as rtc0 May 15 09:22:35.964653 kernel: rtc_cmos 00:04: setting system clock to 2025-05-15T09:22:35 UTC (1747300955) May 15 09:22:35.964727 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram May 15 09:22:35.964738 kernel: NET: Registered PF_INET6 protocol family May 15 09:22:35.964747 kernel: Segment Routing with IPv6 May 15 09:22:35.964757 kernel: In-situ OAM (IOAM) with IPv6 May 15 09:22:35.964765 kernel: NET: Registered PF_PACKET protocol family May 15 09:22:35.964773 kernel: Key type dns_resolver registered May 15 09:22:35.964781 kernel: IPI shorthand broadcast: enabled May 15 09:22:35.964789 kernel: sched_clock: Marking stable (841883502, 163057377)->(1104534805, -99593926) May 15 09:22:35.964797 kernel: registered taskstats version 1 May 15 09:22:35.964805 kernel: Loading compiled-in X.509 certificates May 15 09:22:35.964813 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.181-flatcar: a3400373b5c34ccb74f940604f224840f2b40bdd' May 15 09:22:35.964820 kernel: Key type .fscrypt registered May 15 09:22:35.964830 kernel: Key type fscrypt-provisioning registered May 15 09:22:35.964838 kernel: ima: No TPM chip found, activating TPM-bypass! May 15 09:22:35.964846 kernel: ima: Allocated hash algorithm: sha1 May 15 09:22:35.964853 kernel: ima: No architecture policies found May 15 09:22:35.964861 kernel: clk: Disabling unused clocks May 15 09:22:35.964869 kernel: Freeing unused kernel image (initmem) memory: 47456K May 15 09:22:35.964877 kernel: Write protecting the kernel read-only data: 28672k May 15 09:22:35.964885 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 15 09:22:35.964894 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 15 09:22:35.964902 kernel: Run /init as init process May 15 09:22:35.964910 kernel: with arguments: May 15 09:22:35.964917 kernel: /init May 15 09:22:35.964925 kernel: with environment: May 15 09:22:35.964932 kernel: HOME=/ May 15 09:22:35.964940 kernel: TERM=linux May 15 09:22:35.964948 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 15 09:22:35.964958 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 15 09:22:35.964970 systemd[1]: Detected virtualization kvm. May 15 09:22:35.964979 systemd[1]: Detected architecture x86-64. May 15 09:22:35.964987 systemd[1]: Running in initrd. May 15 09:22:35.964996 systemd[1]: No hostname configured, using default hostname. May 15 09:22:35.965004 systemd[1]: Hostname set to . May 15 09:22:35.965013 systemd[1]: Initializing machine ID from VM UUID. May 15 09:22:35.965021 systemd[1]: Queued start job for default target initrd.target. May 15 09:22:35.965031 systemd[1]: Started systemd-ask-password-console.path. May 15 09:22:35.965039 systemd[1]: Reached target cryptsetup.target. May 15 09:22:35.965047 systemd[1]: Reached target paths.target. May 15 09:22:35.965055 systemd[1]: Reached target slices.target. May 15 09:22:35.965064 systemd[1]: Reached target swap.target. May 15 09:22:35.965072 systemd[1]: Reached target timers.target. May 15 09:22:35.971120 systemd[1]: Listening on iscsid.socket. May 15 09:22:35.971140 systemd[1]: Listening on iscsiuio.socket. May 15 09:22:35.971153 systemd[1]: Listening on systemd-journald-audit.socket. May 15 09:22:35.971169 systemd[1]: Listening on systemd-journald-dev-log.socket. May 15 09:22:35.971180 systemd[1]: Listening on systemd-journald.socket. May 15 09:22:35.971189 systemd[1]: Listening on systemd-networkd.socket. May 15 09:22:35.971198 systemd[1]: Listening on systemd-udevd-control.socket. May 15 09:22:35.971207 systemd[1]: Listening on systemd-udevd-kernel.socket. May 15 09:22:35.971217 systemd[1]: Reached target sockets.target. May 15 09:22:35.971225 systemd[1]: Starting kmod-static-nodes.service... May 15 09:22:35.971234 systemd[1]: Finished network-cleanup.service. May 15 09:22:35.971243 systemd[1]: Starting systemd-fsck-usr.service... May 15 09:22:35.971251 systemd[1]: Starting systemd-journald.service... May 15 09:22:35.971260 systemd[1]: Starting systemd-modules-load.service... May 15 09:22:35.971268 systemd[1]: Starting systemd-resolved.service... May 15 09:22:35.971277 systemd[1]: Starting systemd-vconsole-setup.service... May 15 09:22:35.971286 systemd[1]: Finished kmod-static-nodes.service. May 15 09:22:35.971296 systemd[1]: Finished systemd-fsck-usr.service. May 15 09:22:35.971308 systemd-journald[185]: Journal started May 15 09:22:35.971353 systemd-journald[185]: Runtime Journal (/run/log/journal/3dc0e343546548c8892d8418189f5aca) is 8.0M, max 78.4M, 70.4M free. May 15 09:22:35.965120 systemd-modules-load[186]: Inserted module 'overlay' May 15 09:22:35.966895 systemd-resolved[187]: Positive Trust Anchors: May 15 09:22:35.993434 systemd[1]: Started systemd-journald.service. May 15 09:22:35.993462 kernel: audit: type=1130 audit(1747300955.986:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:35.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:35.966907 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 15 09:22:35.966950 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 15 09:22:35.973161 systemd-resolved[187]: Defaulting to hostname 'linux'. May 15 09:22:36.004976 kernel: audit: type=1130 audit(1747300955.997:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:35.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:35.997936 systemd[1]: Started systemd-resolved.service. May 15 09:22:36.026349 kernel: audit: type=1130 audit(1747300955.998:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:36.026385 kernel: audit: type=1130 audit(1747300956.012:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:36.026397 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 15 09:22:36.026409 kernel: audit: type=1130 audit(1747300956.020:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:35.998000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:36.012000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:36.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:36.003187 systemd[1]: Reached target nss-lookup.target. May 15 09:22:36.004418 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 15 09:22:36.011700 systemd[1]: Finished systemd-vconsole-setup.service. May 15 09:22:36.017139 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 15 09:22:36.021051 systemd[1]: Starting dracut-cmdline-ask.service... May 15 09:22:36.033376 kernel: Bridge firewalling registered May 15 09:22:36.032901 systemd-modules-load[186]: Inserted module 'br_netfilter' May 15 09:22:36.038897 systemd[1]: Finished dracut-cmdline-ask.service. May 15 09:22:36.045222 kernel: audit: type=1130 audit(1747300956.039:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:36.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:36.045401 systemd[1]: Starting dracut-cmdline.service... May 15 09:22:36.064565 dracut-cmdline[201]: dracut-dracut-053 May 15 09:22:36.064565 dracut-cmdline[201]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=bd2e5c4f6706621ae2eebb207adba6951c52e019661e3e87d19fb6c7284acf54 May 15 09:22:36.070116 kernel: SCSI subsystem initialized May 15 09:22:36.088563 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 15 09:22:36.088640 kernel: device-mapper: uevent: version 1.0.3 May 15 09:22:36.090729 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 15 09:22:36.094453 systemd-modules-load[186]: Inserted module 'dm_multipath' May 15 09:22:36.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:36.095960 systemd[1]: Finished systemd-modules-load.service. May 15 09:22:36.103646 kernel: audit: type=1130 audit(1747300956.096:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:36.097261 systemd[1]: Starting systemd-sysctl.service... May 15 09:22:36.109121 kernel: Loading iSCSI transport class v2.0-870. May 15 09:22:36.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:36.110071 systemd[1]: Finished systemd-sysctl.service. May 15 09:22:36.116704 kernel: audit: type=1130 audit(1747300956.110:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:36.134126 kernel: iscsi: registered transport (tcp) May 15 09:22:36.164213 kernel: iscsi: registered transport (qla4xxx) May 15 09:22:36.164255 kernel: QLogic iSCSI HBA Driver May 15 09:22:36.211000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:36.211052 systemd[1]: Finished dracut-cmdline.service. May 15 09:22:36.218044 kernel: audit: type=1130 audit(1747300956.211:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:36.213446 systemd[1]: Starting dracut-pre-udev.service... May 15 09:22:36.302192 kernel: raid6: sse2x4 gen() 7535 MB/s May 15 09:22:36.320183 kernel: raid6: sse2x4 xor() 5084 MB/s May 15 09:22:36.338184 kernel: raid6: sse2x2 gen() 14044 MB/s May 15 09:22:36.356183 kernel: raid6: sse2x2 xor() 8753 MB/s May 15 09:22:36.374171 kernel: raid6: sse2x1 gen() 10901 MB/s May 15 09:22:36.392482 kernel: raid6: sse2x1 xor() 6897 MB/s May 15 09:22:36.392539 kernel: raid6: using algorithm sse2x2 gen() 14044 MB/s May 15 09:22:36.392566 kernel: raid6: .... xor() 8753 MB/s, rmw enabled May 15 09:22:36.393654 kernel: raid6: using ssse3x2 recovery algorithm May 15 09:22:36.413687 kernel: xor: measuring software checksum speed May 15 09:22:36.413744 kernel: prefetch64-sse : 18250 MB/sec May 15 09:22:36.414957 kernel: generic_sse : 16683 MB/sec May 15 09:22:36.415002 kernel: xor: using function: prefetch64-sse (18250 MB/sec) May 15 09:22:36.530149 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 15 09:22:36.546767 systemd[1]: Finished dracut-pre-udev.service. May 15 09:22:36.547000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:36.548000 audit: BPF prog-id=7 op=LOAD May 15 09:22:36.548000 audit: BPF prog-id=8 op=LOAD May 15 09:22:36.549902 systemd[1]: Starting systemd-udevd.service... May 15 09:22:36.564197 systemd-udevd[386]: Using default interface naming scheme 'v252'. May 15 09:22:36.569316 systemd[1]: Started systemd-udevd.service. May 15 09:22:36.574000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:36.577646 systemd[1]: Starting dracut-pre-trigger.service... May 15 09:22:36.603949 dracut-pre-trigger[407]: rd.md=0: removing MD RAID activation May 15 09:22:36.647000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:36.646637 systemd[1]: Finished dracut-pre-trigger.service. May 15 09:22:36.649543 systemd[1]: Starting systemd-udev-trigger.service... May 15 09:22:36.691598 systemd[1]: Finished systemd-udev-trigger.service. May 15 09:22:36.692000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:36.767150 kernel: libata version 3.00 loaded. May 15 09:22:36.770522 kernel: ata_piix 0000:00:01.1: version 2.13 May 15 09:22:36.810125 kernel: scsi host0: ata_piix May 15 09:22:36.810253 kernel: virtio_blk virtio2: [vda] 20971520 512-byte logical blocks (10.7 GB/10.0 GiB) May 15 09:22:36.812156 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 15 09:22:36.812171 kernel: GPT:17805311 != 20971519 May 15 09:22:36.812181 kernel: GPT:Alternate GPT header not at the end of the disk. May 15 09:22:36.812192 kernel: scsi host1: ata_piix May 15 09:22:36.812295 kernel: GPT:17805311 != 20971519 May 15 09:22:36.812307 kernel: GPT: Use GNU Parted to correct GPT errors. May 15 09:22:36.812317 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 09:22:36.812327 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc120 irq 14 May 15 09:22:36.812339 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc128 irq 15 May 15 09:22:37.006136 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (456) May 15 09:22:37.016154 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 15 09:22:37.018252 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 15 09:22:37.036648 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 15 09:22:37.046783 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 15 09:22:37.051495 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 15 09:22:37.054439 systemd[1]: Starting disk-uuid.service... May 15 09:22:37.068823 disk-uuid[472]: Primary Header is updated. May 15 09:22:37.068823 disk-uuid[472]: Secondary Entries is updated. May 15 09:22:37.068823 disk-uuid[472]: Secondary Header is updated. May 15 09:22:37.078133 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 09:22:37.096168 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 09:22:38.097159 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 09:22:38.097665 disk-uuid[473]: The operation has completed successfully. May 15 09:22:38.179700 systemd[1]: disk-uuid.service: Deactivated successfully. May 15 09:22:38.180720 systemd[1]: Finished disk-uuid.service. May 15 09:22:38.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:38.182000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:38.194877 systemd[1]: Starting verity-setup.service... May 15 09:22:38.232190 kernel: device-mapper: verity: sha256 using implementation "sha256-ssse3" May 15 09:22:38.345007 systemd[1]: Found device dev-mapper-usr.device. May 15 09:22:38.347952 systemd[1]: Mounting sysusr-usr.mount... May 15 09:22:38.351896 systemd[1]: Finished verity-setup.service. May 15 09:22:38.355000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:38.479177 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 15 09:22:38.479400 systemd[1]: Mounted sysusr-usr.mount. May 15 09:22:38.480023 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 15 09:22:38.480840 systemd[1]: Starting ignition-setup.service... May 15 09:22:38.487027 systemd[1]: Starting parse-ip-for-networkd.service... May 15 09:22:38.499030 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 15 09:22:38.499074 kernel: BTRFS info (device vda6): using free space tree May 15 09:22:38.499101 kernel: BTRFS info (device vda6): has skinny extents May 15 09:22:38.514389 systemd[1]: mnt-oem.mount: Deactivated successfully. May 15 09:22:38.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:38.530983 systemd[1]: Finished ignition-setup.service. May 15 09:22:38.532443 systemd[1]: Starting ignition-fetch-offline.service... May 15 09:22:38.615000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:38.616000 audit: BPF prog-id=9 op=LOAD May 15 09:22:38.615079 systemd[1]: Finished parse-ip-for-networkd.service. May 15 09:22:38.617054 systemd[1]: Starting systemd-networkd.service... May 15 09:22:38.643058 systemd-networkd[642]: lo: Link UP May 15 09:22:38.643071 systemd-networkd[642]: lo: Gained carrier May 15 09:22:38.643555 systemd-networkd[642]: Enumeration completed May 15 09:22:38.646000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:38.643808 systemd-networkd[642]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 15 09:22:38.644845 systemd-networkd[642]: eth0: Link UP May 15 09:22:38.644849 systemd-networkd[642]: eth0: Gained carrier May 15 09:22:38.645193 systemd[1]: Started systemd-networkd.service. May 15 09:22:38.646648 systemd[1]: Reached target network.target. May 15 09:22:38.650128 systemd[1]: Starting iscsiuio.service... May 15 09:22:38.656974 systemd[1]: Started iscsiuio.service. May 15 09:22:38.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:38.659680 systemd[1]: Starting iscsid.service... May 15 09:22:38.660908 systemd-networkd[642]: eth0: DHCPv4 address 172.24.4.111/24, gateway 172.24.4.1 acquired from 172.24.4.1 May 15 09:22:38.662803 iscsid[651]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 15 09:22:38.662803 iscsid[651]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 15 09:22:38.662803 iscsid[651]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 15 09:22:38.662803 iscsid[651]: If using hardware iscsi like qla4xxx this message can be ignored. May 15 09:22:38.662803 iscsid[651]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 15 09:22:38.662803 iscsid[651]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 15 09:22:38.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:38.665324 systemd[1]: Started iscsid.service. May 15 09:22:38.669739 systemd[1]: Starting dracut-initqueue.service... May 15 09:22:38.682287 systemd[1]: Finished dracut-initqueue.service. May 15 09:22:38.683000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:38.683685 systemd[1]: Reached target remote-fs-pre.target. May 15 09:22:38.685095 systemd[1]: Reached target remote-cryptsetup.target. May 15 09:22:38.686575 systemd[1]: Reached target remote-fs.target. May 15 09:22:38.689041 systemd[1]: Starting dracut-pre-mount.service... May 15 09:22:38.702421 systemd[1]: Finished dracut-pre-mount.service. May 15 09:22:38.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:38.797333 ignition[560]: Ignition 2.14.0 May 15 09:22:38.798467 ignition[560]: Stage: fetch-offline May 15 09:22:38.798618 ignition[560]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 15 09:22:38.798673 ignition[560]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 15 09:22:38.800980 ignition[560]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 15 09:22:38.801232 ignition[560]: parsed url from cmdline: "" May 15 09:22:38.803595 systemd[1]: Finished ignition-fetch-offline.service. May 15 09:22:38.805000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:38.801242 ignition[560]: no config URL provided May 15 09:22:38.801254 ignition[560]: reading system config file "/usr/lib/ignition/user.ign" May 15 09:22:38.807835 systemd[1]: Starting ignition-fetch.service... May 15 09:22:38.801274 ignition[560]: no config at "/usr/lib/ignition/user.ign" May 15 09:22:38.801295 ignition[560]: failed to fetch config: resource requires networking May 15 09:22:38.801744 ignition[560]: Ignition finished successfully May 15 09:22:38.826903 ignition[666]: Ignition 2.14.0 May 15 09:22:38.826929 ignition[666]: Stage: fetch May 15 09:22:38.827236 ignition[666]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 15 09:22:38.827281 ignition[666]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 15 09:22:38.829539 ignition[666]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 15 09:22:38.829759 ignition[666]: parsed url from cmdline: "" May 15 09:22:38.829769 ignition[666]: no config URL provided May 15 09:22:38.829782 ignition[666]: reading system config file "/usr/lib/ignition/user.ign" May 15 09:22:38.829802 ignition[666]: no config at "/usr/lib/ignition/user.ign" May 15 09:22:38.834463 ignition[666]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... May 15 09:22:38.834540 ignition[666]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... May 15 09:22:38.838065 ignition[666]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 May 15 09:22:39.107458 ignition[666]: GET result: OK May 15 09:22:39.107571 ignition[666]: parsing config with SHA512: 5b07dfcb710393ce7b77e615641fd6d2abdae2a2ceefc258ded78cd1e277c2ceae0ea06d374b916a2142a1cabdac10232ca58c1fbf9f8f56c114a365a3fac02b May 15 09:22:39.120179 unknown[666]: fetched base config from "system" May 15 09:22:39.120207 unknown[666]: fetched base config from "system" May 15 09:22:39.120923 ignition[666]: fetch: fetch complete May 15 09:22:39.120223 unknown[666]: fetched user config from "openstack" May 15 09:22:39.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:39.120936 ignition[666]: fetch: fetch passed May 15 09:22:39.123899 systemd[1]: Finished ignition-fetch.service. May 15 09:22:39.121017 ignition[666]: Ignition finished successfully May 15 09:22:39.127530 systemd[1]: Starting ignition-kargs.service... May 15 09:22:39.160559 ignition[672]: Ignition 2.14.0 May 15 09:22:39.160587 ignition[672]: Stage: kargs May 15 09:22:39.160839 ignition[672]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 15 09:22:39.160891 ignition[672]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 15 09:22:39.163302 ignition[672]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 15 09:22:39.165328 ignition[672]: kargs: kargs passed May 15 09:22:39.165428 ignition[672]: Ignition finished successfully May 15 09:22:39.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:39.167276 systemd[1]: Finished ignition-kargs.service. May 15 09:22:39.169538 systemd[1]: Starting ignition-disks.service... May 15 09:22:39.187505 ignition[678]: Ignition 2.14.0 May 15 09:22:39.189309 ignition[678]: Stage: disks May 15 09:22:39.190915 ignition[678]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 15 09:22:39.192845 ignition[678]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 15 09:22:39.195457 ignition[678]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 15 09:22:39.198614 ignition[678]: disks: disks passed May 15 09:22:39.199800 ignition[678]: Ignition finished successfully May 15 09:22:39.201335 systemd[1]: Finished ignition-disks.service. May 15 09:22:39.202000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:39.202398 systemd[1]: Reached target initrd-root-device.target. May 15 09:22:39.203794 systemd[1]: Reached target local-fs-pre.target. May 15 09:22:39.205203 systemd[1]: Reached target local-fs.target. May 15 09:22:39.206620 systemd[1]: Reached target sysinit.target. May 15 09:22:39.207972 systemd[1]: Reached target basic.target. May 15 09:22:39.210711 systemd[1]: Starting systemd-fsck-root.service... May 15 09:22:39.235353 systemd-fsck[685]: ROOT: clean, 619/1628000 files, 124060/1617920 blocks May 15 09:22:39.246874 systemd[1]: Finished systemd-fsck-root.service. May 15 09:22:39.248000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:39.250563 systemd[1]: Mounting sysroot.mount... May 15 09:22:39.271166 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 15 09:22:39.272645 systemd[1]: Mounted sysroot.mount. May 15 09:22:39.275304 systemd[1]: Reached target initrd-root-fs.target. May 15 09:22:39.280574 systemd[1]: Mounting sysroot-usr.mount... May 15 09:22:39.282788 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 15 09:22:39.284910 systemd[1]: Starting flatcar-openstack-hostname.service... May 15 09:22:39.286302 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 15 09:22:39.286423 systemd[1]: Reached target ignition-diskful.target. May 15 09:22:39.300872 systemd[1]: Mounted sysroot-usr.mount. May 15 09:22:39.304649 systemd[1]: Starting initrd-setup-root.service... May 15 09:22:39.317319 initrd-setup-root[696]: cut: /sysroot/etc/passwd: No such file or directory May 15 09:22:39.338874 initrd-setup-root[704]: cut: /sysroot/etc/group: No such file or directory May 15 09:22:39.350850 initrd-setup-root[712]: cut: /sysroot/etc/shadow: No such file or directory May 15 09:22:39.356302 initrd-setup-root[720]: cut: /sysroot/etc/gshadow: No such file or directory May 15 09:22:39.382588 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 15 09:22:39.401114 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (729) May 15 09:22:39.406918 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 15 09:22:39.406949 kernel: BTRFS info (device vda6): using free space tree May 15 09:22:39.406961 kernel: BTRFS info (device vda6): has skinny extents May 15 09:22:39.425388 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 15 09:22:39.440825 systemd[1]: Finished initrd-setup-root.service. May 15 09:22:39.442881 systemd[1]: Starting ignition-mount.service... May 15 09:22:39.441000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:39.444287 systemd[1]: Starting sysroot-boot.service... May 15 09:22:39.453638 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. May 15 09:22:39.454503 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. May 15 09:22:39.468607 ignition[759]: INFO : Ignition 2.14.0 May 15 09:22:39.469424 ignition[759]: INFO : Stage: mount May 15 09:22:39.470032 ignition[759]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 15 09:22:39.471041 ignition[759]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 15 09:22:39.473248 ignition[759]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 15 09:22:39.474995 ignition[759]: INFO : mount: mount passed May 15 09:22:39.475613 ignition[759]: INFO : Ignition finished successfully May 15 09:22:39.478000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:39.478467 systemd[1]: Finished ignition-mount.service. May 15 09:22:39.492949 systemd[1]: Finished sysroot-boot.service. May 15 09:22:39.493000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:39.519999 coreos-metadata[691]: May 15 09:22:39.519 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 May 15 09:22:39.539101 coreos-metadata[691]: May 15 09:22:39.538 INFO Fetch successful May 15 09:22:39.539800 coreos-metadata[691]: May 15 09:22:39.539 INFO wrote hostname ci-3510-3-7-n-9ad0e9ad1c.novalocal to /sysroot/etc/hostname May 15 09:22:39.544591 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. May 15 09:22:39.544748 systemd[1]: Finished flatcar-openstack-hostname.service. May 15 09:22:39.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:39.546000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:39.547762 systemd[1]: Starting ignition-files.service... May 15 09:22:39.557314 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 15 09:22:39.567158 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/vda6 scanned by mount (768) May 15 09:22:39.571623 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 15 09:22:39.571665 kernel: BTRFS info (device vda6): using free space tree May 15 09:22:39.571685 kernel: BTRFS info (device vda6): has skinny extents May 15 09:22:39.588460 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 15 09:22:39.610382 ignition[787]: INFO : Ignition 2.14.0 May 15 09:22:39.610382 ignition[787]: INFO : Stage: files May 15 09:22:39.612572 ignition[787]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 15 09:22:39.612572 ignition[787]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 15 09:22:39.616142 ignition[787]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 15 09:22:39.623179 ignition[787]: DEBUG : files: compiled without relabeling support, skipping May 15 09:22:39.624608 ignition[787]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 15 09:22:39.624608 ignition[787]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 15 09:22:39.629967 ignition[787]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 15 09:22:39.632033 ignition[787]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 15 09:22:39.633897 ignition[787]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 15 09:22:39.632679 unknown[787]: wrote ssh authorized keys file for user: core May 15 09:22:39.637604 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" May 15 09:22:39.637604 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" May 15 09:22:39.637604 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" May 15 09:22:39.637604 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 15 09:22:39.637604 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 15 09:22:39.637604 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 15 09:22:39.637604 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 15 09:22:39.637604 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.31.0-x86-64.raw: attempt #1 May 15 09:22:40.363480 systemd-networkd[642]: eth0: Gained IPv6LL May 15 09:22:40.410614 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK May 15 09:22:42.047852 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 15 09:22:42.049276 ignition[787]: INFO : files: op(7): [started] processing unit "coreos-metadata-sshkeys@.service" May 15 09:22:42.050022 ignition[787]: INFO : files: op(7): [finished] processing unit "coreos-metadata-sshkeys@.service" May 15 09:22:42.050794 ignition[787]: INFO : files: op(8): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 15 09:22:42.055842 ignition[787]: INFO : files: op(8): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 15 09:22:42.065973 ignition[787]: INFO : files: createResultFile: createFiles: op(9): [started] writing file "/sysroot/etc/.ignition-result.json" May 15 09:22:42.065973 ignition[787]: INFO : files: createResultFile: createFiles: op(9): [finished] writing file "/sysroot/etc/.ignition-result.json" May 15 09:22:42.065973 ignition[787]: INFO : files: files passed May 15 09:22:42.065973 ignition[787]: INFO : Ignition finished successfully May 15 09:22:42.068079 systemd[1]: Finished ignition-files.service. May 15 09:22:42.083118 kernel: kauditd_printk_skb: 27 callbacks suppressed May 15 09:22:42.083157 kernel: audit: type=1130 audit(1747300962.072:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:42.072000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:42.077055 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 15 09:22:42.079742 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 15 09:22:42.086000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:42.080720 systemd[1]: Starting ignition-quench.service... May 15 09:22:42.107272 kernel: audit: type=1130 audit(1747300962.086:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:42.107299 kernel: audit: type=1131 audit(1747300962.086:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:42.086000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:42.085683 systemd[1]: ignition-quench.service: Deactivated successfully. May 15 09:22:42.085780 systemd[1]: Finished ignition-quench.service. May 15 09:22:42.109077 initrd-setup-root-after-ignition[812]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 15 09:22:42.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:42.109995 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 15 09:22:42.117721 kernel: audit: type=1130 audit(1747300962.110:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:42.110961 systemd[1]: Reached target ignition-complete.target. May 15 09:22:42.118702 systemd[1]: Starting initrd-parse-etc.service... May 15 09:22:42.137351 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 15 09:22:42.138371 systemd[1]: Finished initrd-parse-etc.service. May 15 09:22:42.166722 kernel: audit: type=1130 audit(1747300962.139:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:42.166779 kernel: audit: type=1131 audit(1747300962.139:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:42.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:42.139000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:42.139591 systemd[1]: Reached target initrd-fs.target. May 15 09:22:42.167341 systemd[1]: Reached target initrd.target. May 15 09:22:42.168916 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 15 09:22:42.169870 systemd[1]: Starting dracut-pre-pivot.service... May 15 09:22:42.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:42.182360 systemd[1]: Finished dracut-pre-pivot.service. May 15 09:22:42.188106 kernel: audit: type=1130 audit(1747300962.182:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:42.188215 systemd[1]: Starting initrd-cleanup.service... May 15 09:22:42.197776 systemd[1]: Stopped target nss-lookup.target. May 15 09:22:42.198862 systemd[1]: Stopped target remote-cryptsetup.target. May 15 09:22:42.199958 systemd[1]: Stopped target timers.target. May 15 09:22:42.200987 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 15 09:22:42.201364 systemd[1]: Stopped dracut-pre-pivot.service. May 15 09:22:42.207717 kernel: audit: type=1131 audit(1747300962.202:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:42.202000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:42.202331 systemd[1]: Stopped target initrd.target. May 15 09:22:42.208366 systemd[1]: Stopped target basic.target. May 15 09:22:42.209287 systemd[1]: Stopped target ignition-complete.target. May 15 09:22:42.210250 systemd[1]: Stopped target ignition-diskful.target. May 15 09:22:42.211262 systemd[1]: Stopped target initrd-root-device.target. May 15 09:22:42.212366 systemd[1]: Stopped target remote-fs.target. May 15 09:22:42.213357 systemd[1]: Stopped target remote-fs-pre.target. May 15 09:22:42.214326 systemd[1]: Stopped target sysinit.target. May 15 09:22:42.215312 systemd[1]: Stopped target local-fs.target. May 15 09:22:42.216229 systemd[1]: Stopped target local-fs-pre.target. May 15 09:22:42.217184 systemd[1]: Stopped target swap.target. May 15 09:22:42.218058 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 15 09:22:42.224726 kernel: audit: type=1131 audit(1747300962.219:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:42.219000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:42.218246 systemd[1]: Stopped dracut-pre-mount.service. May 15 09:22:42.219287 systemd[1]: Stopped target cryptsetup.target. May 15 09:22:42.231878 kernel: audit: type=1131 audit(1747300962.226:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:42.226000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:42.225283 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 15 09:22:42.232000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:42.225422 systemd[1]: Stopped dracut-initqueue.service. May 15 09:22:42.233000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:42.226358 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 15 09:22:42.226566 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 15 09:22:42.232520 systemd[1]: ignition-files.service: Deactivated successfully. May 15 09:22:42.243000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:42.244000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:42.232659 systemd[1]: Stopped ignition-files.service. May 15 09:22:42.252000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:42.252000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:42.234491 systemd[1]: Stopping ignition-mount.service... May 15 09:22:42.253000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:42.253826 ignition[825]: INFO : Ignition 2.14.0 May 15 09:22:42.253826 ignition[825]: INFO : Stage: umount May 15 09:22:42.253826 ignition[825]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 15 09:22:42.253826 ignition[825]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 15 09:22:42.253826 ignition[825]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 15 09:22:42.253826 ignition[825]: INFO : umount: umount passed May 15 09:22:42.253826 ignition[825]: INFO : Ignition finished successfully May 15 09:22:42.254000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:42.255000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:42.256000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:42.259000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:42.235866 systemd[1]: Stopping sysroot-boot.service... May 15 09:22:42.243250 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 15 09:22:42.243436 systemd[1]: Stopped systemd-udev-trigger.service. May 15 09:22:42.244051 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 15 09:22:42.244221 systemd[1]: Stopped dracut-pre-trigger.service. May 15 09:22:42.248316 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 15 09:22:42.248419 systemd[1]: Finished initrd-cleanup.service. May 15 09:22:42.252455 systemd[1]: ignition-mount.service: Deactivated successfully. May 15 09:22:42.271000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:42.252543 systemd[1]: Stopped ignition-mount.service. May 15 09:22:42.254190 systemd[1]: ignition-disks.service: Deactivated successfully. May 15 09:22:42.254230 systemd[1]: Stopped ignition-disks.service. May 15 09:22:42.255016 systemd[1]: ignition-kargs.service: Deactivated successfully. May 15 09:22:42.255053 systemd[1]: Stopped ignition-kargs.service. May 15 09:22:42.255911 systemd[1]: ignition-fetch.service: Deactivated successfully. May 15 09:22:42.255945 systemd[1]: Stopped ignition-fetch.service. May 15 09:22:42.257145 systemd[1]: Stopped target network.target. May 15 09:22:42.258614 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 15 09:22:42.277000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:42.258653 systemd[1]: Stopped ignition-fetch-offline.service. May 15 09:22:42.278000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:42.259804 systemd[1]: Stopped target paths.target. May 15 09:22:42.262491 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 15 09:22:42.280000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:42.281000 audit: BPF prog-id=6 op=UNLOAD May 15 09:22:42.266127 systemd[1]: Stopped systemd-ask-password-console.path. May 15 09:22:42.267551 systemd[1]: Stopped target slices.target. May 15 09:22:42.287000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:42.269352 systemd[1]: Stopped target sockets.target. May 15 09:22:42.269822 systemd[1]: iscsid.socket: Deactivated successfully. May 15 09:22:42.269848 systemd[1]: Closed iscsid.socket. May 15 09:22:42.270287 systemd[1]: iscsiuio.socket: Deactivated successfully. May 15 09:22:42.270310 systemd[1]: Closed iscsiuio.socket. May 15 09:22:42.291000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:42.270731 systemd[1]: ignition-setup.service: Deactivated successfully. May 15 09:22:42.292000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:42.270768 systemd[1]: Stopped ignition-setup.service. May 15 09:22:42.293000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:42.271816 systemd[1]: Stopping systemd-networkd.service... May 15 09:22:42.272606 systemd[1]: Stopping systemd-resolved.service... May 15 09:22:42.274600 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 15 09:22:42.275073 systemd[1]: sysroot-boot.service: Deactivated successfully. May 15 09:22:42.275151 systemd-networkd[642]: eth0: DHCPv6 lease lost May 15 09:22:42.301000 audit: BPF prog-id=9 op=UNLOAD May 15 09:22:42.275924 systemd[1]: Stopped sysroot-boot.service. May 15 09:22:42.278011 systemd[1]: systemd-resolved.service: Deactivated successfully. May 15 09:22:42.278112 systemd[1]: Stopped systemd-resolved.service. May 15 09:22:42.280080 systemd[1]: systemd-networkd.service: Deactivated successfully. May 15 09:22:42.304000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:42.280195 systemd[1]: Stopped systemd-networkd.service. May 15 09:22:42.306000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:42.281683 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 15 09:22:42.281712 systemd[1]: Closed systemd-networkd.socket. May 15 09:22:42.286372 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 15 09:22:42.309000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:42.286411 systemd[1]: Stopped initrd-setup-root.service. May 15 09:22:42.310000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:42.288174 systemd[1]: Stopping network-cleanup.service... May 15 09:22:42.311000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:42.290035 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 15 09:22:42.290080 systemd[1]: Stopped parse-ip-for-networkd.service. May 15 09:22:42.291259 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 15 09:22:42.291295 systemd[1]: Stopped systemd-sysctl.service. May 15 09:22:42.292421 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 15 09:22:42.292457 systemd[1]: Stopped systemd-modules-load.service. May 15 09:22:42.318000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:42.319000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:42.293280 systemd[1]: Stopping systemd-udevd.service... May 15 09:22:42.320000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:42.300543 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 15 09:22:42.302812 systemd[1]: network-cleanup.service: Deactivated successfully. May 15 09:22:42.302899 systemd[1]: Stopped network-cleanup.service. May 15 09:22:42.322000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:42.322000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:42.305394 systemd[1]: systemd-udevd.service: Deactivated successfully. May 15 09:22:42.305518 systemd[1]: Stopped systemd-udevd.service. May 15 09:22:42.306691 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 15 09:22:42.306726 systemd[1]: Closed systemd-udevd-control.socket. May 15 09:22:42.307757 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 15 09:22:42.307786 systemd[1]: Closed systemd-udevd-kernel.socket. May 15 09:22:42.308713 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 15 09:22:42.308752 systemd[1]: Stopped dracut-pre-udev.service. May 15 09:22:42.309658 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 15 09:22:42.309694 systemd[1]: Stopped dracut-cmdline.service. May 15 09:22:42.310764 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 15 09:22:42.310806 systemd[1]: Stopped dracut-cmdline-ask.service. May 15 09:22:42.312550 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 15 09:22:42.313402 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. May 15 09:22:42.313451 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. May 15 09:22:42.318984 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 15 09:22:42.319037 systemd[1]: Stopped kmod-static-nodes.service. May 15 09:22:42.319529 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 15 09:22:42.319565 systemd[1]: Stopped systemd-vconsole-setup.service. May 15 09:22:42.321509 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. May 15 09:22:42.321965 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 15 09:22:42.322053 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 15 09:22:42.323181 systemd[1]: Reached target initrd-switch-root.target. May 15 09:22:42.324698 systemd[1]: Starting initrd-switch-root.service... May 15 09:22:42.343059 systemd[1]: Switching root. May 15 09:22:42.364371 iscsid[651]: iscsid shutting down. May 15 09:22:42.364979 systemd-journald[185]: Journal stopped May 15 09:22:46.733553 systemd-journald[185]: Received SIGTERM from PID 1 (systemd). May 15 09:22:46.733606 kernel: SELinux: Class mctp_socket not defined in policy. May 15 09:22:46.733623 kernel: SELinux: Class anon_inode not defined in policy. May 15 09:22:46.733636 kernel: SELinux: the above unknown classes and permissions will be allowed May 15 09:22:46.733647 kernel: SELinux: policy capability network_peer_controls=1 May 15 09:22:46.733658 kernel: SELinux: policy capability open_perms=1 May 15 09:22:46.733672 kernel: SELinux: policy capability extended_socket_class=1 May 15 09:22:46.733684 kernel: SELinux: policy capability always_check_network=0 May 15 09:22:46.733695 kernel: SELinux: policy capability cgroup_seclabel=1 May 15 09:22:46.733706 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 15 09:22:46.733717 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 15 09:22:46.733728 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 15 09:22:46.733740 systemd[1]: Successfully loaded SELinux policy in 100.006ms. May 15 09:22:46.733759 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 23.802ms. May 15 09:22:46.733776 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 15 09:22:46.733789 systemd[1]: Detected virtualization kvm. May 15 09:22:46.733801 systemd[1]: Detected architecture x86-64. May 15 09:22:46.733813 systemd[1]: Detected first boot. May 15 09:22:46.733828 systemd[1]: Hostname set to . May 15 09:22:46.733840 systemd[1]: Initializing machine ID from VM UUID. May 15 09:22:46.733852 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 15 09:22:46.733864 systemd[1]: Populated /etc with preset unit settings. May 15 09:22:46.733878 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 09:22:46.733894 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 09:22:46.733908 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 09:22:46.733921 systemd[1]: iscsiuio.service: Deactivated successfully. May 15 09:22:46.733933 systemd[1]: Stopped iscsiuio.service. May 15 09:22:46.733945 systemd[1]: iscsid.service: Deactivated successfully. May 15 09:22:46.733958 systemd[1]: Stopped iscsid.service. May 15 09:22:46.733970 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 15 09:22:46.733982 systemd[1]: Stopped initrd-switch-root.service. May 15 09:22:46.734300 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 15 09:22:46.734317 systemd[1]: Created slice system-addon\x2dconfig.slice. May 15 09:22:46.734343 systemd[1]: Created slice system-addon\x2drun.slice. May 15 09:22:46.734360 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. May 15 09:22:46.734372 systemd[1]: Created slice system-getty.slice. May 15 09:22:46.734384 systemd[1]: Created slice system-modprobe.slice. May 15 09:22:46.734402 systemd[1]: Created slice system-serial\x2dgetty.slice. May 15 09:22:46.734415 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 15 09:22:46.734427 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 15 09:22:46.734440 systemd[1]: Created slice user.slice. May 15 09:22:46.734457 systemd[1]: Started systemd-ask-password-console.path. May 15 09:22:46.734469 systemd[1]: Started systemd-ask-password-wall.path. May 15 09:22:46.734481 systemd[1]: Set up automount boot.automount. May 15 09:22:46.734493 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 15 09:22:46.734505 systemd[1]: Stopped target initrd-switch-root.target. May 15 09:22:46.734518 systemd[1]: Stopped target initrd-fs.target. May 15 09:22:46.734530 systemd[1]: Stopped target initrd-root-fs.target. May 15 09:22:46.734542 systemd[1]: Reached target integritysetup.target. May 15 09:22:46.734556 systemd[1]: Reached target remote-cryptsetup.target. May 15 09:22:46.734569 systemd[1]: Reached target remote-fs.target. May 15 09:22:46.734581 systemd[1]: Reached target slices.target. May 15 09:22:46.734593 systemd[1]: Reached target swap.target. May 15 09:22:46.734605 systemd[1]: Reached target torcx.target. May 15 09:22:46.734617 systemd[1]: Reached target veritysetup.target. May 15 09:22:46.734629 systemd[1]: Listening on systemd-coredump.socket. May 15 09:22:46.734641 systemd[1]: Listening on systemd-initctl.socket. May 15 09:22:46.734653 systemd[1]: Listening on systemd-networkd.socket. May 15 09:22:46.734665 systemd[1]: Listening on systemd-udevd-control.socket. May 15 09:22:46.734680 systemd[1]: Listening on systemd-udevd-kernel.socket. May 15 09:22:46.734692 systemd[1]: Listening on systemd-userdbd.socket. May 15 09:22:46.734704 systemd[1]: Mounting dev-hugepages.mount... May 15 09:22:46.734717 systemd[1]: Mounting dev-mqueue.mount... May 15 09:22:46.734729 systemd[1]: Mounting media.mount... May 15 09:22:46.734742 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 09:22:46.734754 systemd[1]: Mounting sys-kernel-debug.mount... May 15 09:22:46.734765 systemd[1]: Mounting sys-kernel-tracing.mount... May 15 09:22:46.734777 systemd[1]: Mounting tmp.mount... May 15 09:22:46.734791 systemd[1]: Starting flatcar-tmpfiles.service... May 15 09:22:46.734803 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 09:22:46.734815 systemd[1]: Starting kmod-static-nodes.service... May 15 09:22:46.734828 systemd[1]: Starting modprobe@configfs.service... May 15 09:22:46.734839 systemd[1]: Starting modprobe@dm_mod.service... May 15 09:22:46.734852 systemd[1]: Starting modprobe@drm.service... May 15 09:22:46.734864 systemd[1]: Starting modprobe@efi_pstore.service... May 15 09:22:46.734876 systemd[1]: Starting modprobe@fuse.service... May 15 09:22:46.734887 systemd[1]: Starting modprobe@loop.service... May 15 09:22:46.734902 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 15 09:22:46.734914 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 15 09:22:46.734926 systemd[1]: Stopped systemd-fsck-root.service. May 15 09:22:46.734939 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 15 09:22:46.734950 systemd[1]: Stopped systemd-fsck-usr.service. May 15 09:22:46.734962 systemd[1]: Stopped systemd-journald.service. May 15 09:22:46.734975 systemd[1]: Starting systemd-journald.service... May 15 09:22:46.734987 kernel: loop: module loaded May 15 09:22:46.734998 systemd[1]: Starting systemd-modules-load.service... May 15 09:22:46.735013 systemd[1]: Starting systemd-network-generator.service... May 15 09:22:46.735025 systemd[1]: Starting systemd-remount-fs.service... May 15 09:22:46.735037 systemd[1]: Starting systemd-udev-trigger.service... May 15 09:22:46.735049 systemd[1]: verity-setup.service: Deactivated successfully. May 15 09:22:46.735060 systemd[1]: Stopped verity-setup.service. May 15 09:22:46.735073 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 09:22:46.735104 systemd[1]: Mounted dev-hugepages.mount. May 15 09:22:46.735117 systemd[1]: Mounted dev-mqueue.mount. May 15 09:22:46.735129 systemd[1]: Mounted media.mount. May 15 09:22:46.735142 kernel: fuse: init (API version 7.34) May 15 09:22:46.735154 systemd[1]: Mounted sys-kernel-debug.mount. May 15 09:22:46.735166 systemd[1]: Mounted sys-kernel-tracing.mount. May 15 09:22:46.735182 systemd-journald[935]: Journal started May 15 09:22:46.735229 systemd-journald[935]: Runtime Journal (/run/log/journal/3dc0e343546548c8892d8418189f5aca) is 8.0M, max 78.4M, 70.4M free. May 15 09:22:42.662000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 15 09:22:42.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 15 09:22:42.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 15 09:22:42.807000 audit: BPF prog-id=10 op=LOAD May 15 09:22:42.807000 audit: BPF prog-id=10 op=UNLOAD May 15 09:22:42.807000 audit: BPF prog-id=11 op=LOAD May 15 09:22:42.807000 audit: BPF prog-id=11 op=UNLOAD May 15 09:22:42.970000 audit[857]: AVC avc: denied { associate } for pid=857 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 15 09:22:42.970000 audit[857]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001178c2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=840 pid=857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:22:42.970000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 15 09:22:42.976000 audit[857]: AVC avc: denied { associate } for pid=857 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 15 09:22:42.976000 audit[857]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c000117999 a2=1ed a3=0 items=2 ppid=840 pid=857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:22:42.976000 audit: CWD cwd="/" May 15 09:22:42.976000 audit: PATH item=0 name=(null) inode=2 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:42.976000 audit: PATH item=1 name=(null) inode=3 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:42.976000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 15 09:22:46.467000 audit: BPF prog-id=12 op=LOAD May 15 09:22:46.467000 audit: BPF prog-id=3 op=UNLOAD May 15 09:22:46.467000 audit: BPF prog-id=13 op=LOAD May 15 09:22:46.467000 audit: BPF prog-id=14 op=LOAD May 15 09:22:46.467000 audit: BPF prog-id=4 op=UNLOAD May 15 09:22:46.467000 audit: BPF prog-id=5 op=UNLOAD May 15 09:22:46.469000 audit: BPF prog-id=15 op=LOAD May 15 09:22:46.469000 audit: BPF prog-id=12 op=UNLOAD May 15 09:22:46.469000 audit: BPF prog-id=16 op=LOAD May 15 09:22:46.469000 audit: BPF prog-id=17 op=LOAD May 15 09:22:46.469000 audit: BPF prog-id=13 op=UNLOAD May 15 09:22:46.469000 audit: BPF prog-id=14 op=UNLOAD May 15 09:22:46.470000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:46.474000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:46.478000 audit: BPF prog-id=15 op=UNLOAD May 15 09:22:46.478000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:46.482000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:46.482000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:46.739484 systemd[1]: Started systemd-journald.service. May 15 09:22:46.677000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:46.685000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:46.687000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:46.687000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:46.689000 audit: BPF prog-id=18 op=LOAD May 15 09:22:46.689000 audit: BPF prog-id=19 op=LOAD May 15 09:22:46.689000 audit: BPF prog-id=20 op=LOAD May 15 09:22:46.689000 audit: BPF prog-id=16 op=UNLOAD May 15 09:22:46.689000 audit: BPF prog-id=17 op=UNLOAD May 15 09:22:46.717000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:46.732000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 15 09:22:46.732000 audit[935]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7ffe3c6bb960 a2=4000 a3=7ffe3c6bb9fc items=0 ppid=1 pid=935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:22:46.732000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 15 09:22:46.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:42.964606 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-05-15T09:22:42Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 15 09:22:46.465678 systemd[1]: Queued start job for default target multi-user.target. May 15 09:22:42.965867 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-05-15T09:22:42Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 15 09:22:46.465691 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 15 09:22:42.965929 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-05-15T09:22:42Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 15 09:22:46.470740 systemd[1]: systemd-journald.service: Deactivated successfully. May 15 09:22:42.966000 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-05-15T09:22:42Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 15 09:22:46.739809 systemd[1]: Mounted tmp.mount. May 15 09:22:42.966029 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-05-15T09:22:42Z" level=debug msg="skipped missing lower profile" missing profile=oem May 15 09:22:42.966153 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-05-15T09:22:42Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 15 09:22:42.966204 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-05-15T09:22:42Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 15 09:22:42.966783 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-05-15T09:22:42Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 15 09:22:42.966880 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-05-15T09:22:42Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 15 09:22:42.966915 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-05-15T09:22:42Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 15 09:22:42.968317 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-05-15T09:22:42Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 15 09:22:42.968409 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-05-15T09:22:42Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 15 09:22:42.968461 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-05-15T09:22:42Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 15 09:22:42.968502 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-05-15T09:22:42Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 15 09:22:42.968546 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-05-15T09:22:42Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 15 09:22:42.968584 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-05-15T09:22:42Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 15 09:22:45.928530 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-05-15T09:22:45Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 09:22:45.928809 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-05-15T09:22:45Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 09:22:46.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:45.928928 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-05-15T09:22:45Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 09:22:46.742421 systemd[1]: Finished kmod-static-nodes.service. May 15 09:22:45.929151 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-05-15T09:22:45Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 09:22:46.743181 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 15 09:22:45.929212 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-05-15T09:22:45Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 15 09:22:46.743315 systemd[1]: Finished modprobe@configfs.service. May 15 09:22:45.929279 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-05-15T09:22:45Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 15 09:22:46.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:46.743000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:46.744079 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 09:22:46.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:46.744000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:46.744240 systemd[1]: Finished modprobe@dm_mod.service. May 15 09:22:46.744929 systemd[1]: modprobe@drm.service: Deactivated successfully. May 15 09:22:46.745055 systemd[1]: Finished modprobe@drm.service. May 15 09:22:46.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:46.745000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:46.745786 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 09:22:46.745897 systemd[1]: Finished modprobe@efi_pstore.service. May 15 09:22:46.746000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:46.746000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:46.746723 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 15 09:22:46.746855 systemd[1]: Finished modprobe@fuse.service. May 15 09:22:46.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:46.747000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:46.748255 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 09:22:46.748375 systemd[1]: Finished modprobe@loop.service. May 15 09:22:46.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:46.748000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:46.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:46.749175 systemd[1]: Finished systemd-modules-load.service. May 15 09:22:46.749828 systemd[1]: Finished systemd-network-generator.service. May 15 09:22:46.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:46.751399 systemd[1]: Finished systemd-remount-fs.service. May 15 09:22:46.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:46.752396 systemd[1]: Reached target network-pre.target. May 15 09:22:46.755259 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 15 09:22:46.757757 systemd[1]: Mounting sys-kernel-config.mount... May 15 09:22:46.761270 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 15 09:22:46.763862 systemd[1]: Starting systemd-hwdb-update.service... May 15 09:22:46.765305 systemd[1]: Starting systemd-journal-flush.service... May 15 09:22:46.765869 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 09:22:46.766873 systemd[1]: Starting systemd-random-seed.service... May 15 09:22:46.767426 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 09:22:46.768398 systemd[1]: Starting systemd-sysctl.service... May 15 09:22:46.770684 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 15 09:22:46.771922 systemd[1]: Mounted sys-kernel-config.mount. May 15 09:22:46.781065 systemd-journald[935]: Time spent on flushing to /var/log/journal/3dc0e343546548c8892d8418189f5aca is 24.830ms for 1084 entries. May 15 09:22:46.781065 systemd-journald[935]: System Journal (/var/log/journal/3dc0e343546548c8892d8418189f5aca) is 8.0M, max 584.8M, 576.8M free. May 15 09:22:46.824306 systemd-journald[935]: Received client request to flush runtime journal. May 15 09:22:46.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:46.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:46.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:46.796471 systemd[1]: Finished flatcar-tmpfiles.service. May 15 09:22:46.802504 systemd[1]: Starting systemd-sysusers.service... May 15 09:22:46.804565 systemd[1]: Finished systemd-random-seed.service. May 15 09:22:46.805483 systemd[1]: Reached target first-boot-complete.target. May 15 09:22:46.825000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:46.809923 systemd[1]: Finished systemd-sysctl.service. May 15 09:22:46.825266 systemd[1]: Finished systemd-journal-flush.service. May 15 09:22:46.842000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:46.841548 systemd[1]: Finished systemd-udev-trigger.service. May 15 09:22:46.843341 systemd[1]: Starting systemd-udev-settle.service... May 15 09:22:46.848000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:46.847669 systemd[1]: Finished systemd-sysusers.service. May 15 09:22:46.849238 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 15 09:22:46.861896 udevadm[969]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. May 15 09:22:46.891000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:46.891272 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 15 09:22:47.467861 systemd[1]: Finished systemd-hwdb-update.service. May 15 09:22:47.469000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:47.484985 kernel: kauditd_printk_skb: 102 callbacks suppressed May 15 09:22:47.485080 kernel: audit: type=1130 audit(1747300967.469:141): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:47.485167 kernel: audit: type=1334 audit(1747300967.472:142): prog-id=21 op=LOAD May 15 09:22:47.472000 audit: BPF prog-id=21 op=LOAD May 15 09:22:47.488000 audit: BPF prog-id=22 op=LOAD May 15 09:22:47.492873 kernel: audit: type=1334 audit(1747300967.488:143): prog-id=22 op=LOAD May 15 09:22:47.488000 audit: BPF prog-id=7 op=UNLOAD May 15 09:22:47.497024 kernel: audit: type=1334 audit(1747300967.488:144): prog-id=7 op=UNLOAD May 15 09:22:47.497517 systemd[1]: Starting systemd-udevd.service... May 15 09:22:47.488000 audit: BPF prog-id=8 op=UNLOAD May 15 09:22:47.504170 kernel: audit: type=1334 audit(1747300967.488:145): prog-id=8 op=UNLOAD May 15 09:22:47.541686 systemd-udevd[972]: Using default interface naming scheme 'v252'. May 15 09:22:48.142350 systemd[1]: Started systemd-udevd.service. May 15 09:22:48.143000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:48.161171 kernel: audit: type=1130 audit(1747300968.143:146): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:48.163632 systemd[1]: Starting systemd-networkd.service... May 15 09:22:48.145000 audit: BPF prog-id=23 op=LOAD May 15 09:22:48.174443 kernel: audit: type=1334 audit(1747300968.145:147): prog-id=23 op=LOAD May 15 09:22:48.187000 audit: BPF prog-id=24 op=LOAD May 15 09:22:48.193176 kernel: audit: type=1334 audit(1747300968.187:148): prog-id=24 op=LOAD May 15 09:22:48.194380 systemd[1]: Starting systemd-userdbd.service... May 15 09:22:48.192000 audit: BPF prog-id=25 op=LOAD May 15 09:22:48.201154 kernel: audit: type=1334 audit(1747300968.192:149): prog-id=25 op=LOAD May 15 09:22:48.192000 audit: BPF prog-id=26 op=LOAD May 15 09:22:48.207786 kernel: audit: type=1334 audit(1747300968.192:150): prog-id=26 op=LOAD May 15 09:22:48.235578 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 15 09:22:48.246626 systemd[1]: Started systemd-userdbd.service. May 15 09:22:48.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:48.287123 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 15 09:22:48.299115 kernel: ACPI: button: Power Button [PWRF] May 15 09:22:48.309000 audit[979]: AVC avc: denied { confidentiality } for pid=979 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 15 09:22:48.309000 audit[979]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5576b6f0c310 a1=338ac a2=7f23441e1bc5 a3=5 items=110 ppid=972 pid=979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:22:48.309000 audit: CWD cwd="/" May 15 09:22:48.309000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=1 name=(null) inode=14433 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=2 name=(null) inode=14433 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=3 name=(null) inode=14434 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=4 name=(null) inode=14433 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=5 name=(null) inode=14435 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=6 name=(null) inode=14433 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=7 name=(null) inode=14436 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=8 name=(null) inode=14436 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=9 name=(null) inode=14437 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=10 name=(null) inode=14436 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=11 name=(null) inode=14438 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=12 name=(null) inode=14436 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=13 name=(null) inode=14439 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=14 name=(null) inode=14436 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=15 name=(null) inode=14440 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=16 name=(null) inode=14436 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=17 name=(null) inode=14441 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=18 name=(null) inode=14433 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=19 name=(null) inode=14442 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=20 name=(null) inode=14442 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=21 name=(null) inode=14443 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=22 name=(null) inode=14442 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=23 name=(null) inode=14444 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=24 name=(null) inode=14442 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=25 name=(null) inode=14445 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=26 name=(null) inode=14442 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=27 name=(null) inode=14446 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=28 name=(null) inode=14442 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=29 name=(null) inode=14447 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=30 name=(null) inode=14433 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=31 name=(null) inode=14448 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=32 name=(null) inode=14448 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=33 name=(null) inode=14449 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=34 name=(null) inode=14448 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=35 name=(null) inode=14450 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=36 name=(null) inode=14448 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=37 name=(null) inode=14451 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=38 name=(null) inode=14448 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=39 name=(null) inode=14452 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=40 name=(null) inode=14448 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=41 name=(null) inode=14453 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=42 name=(null) inode=14433 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=43 name=(null) inode=14454 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=44 name=(null) inode=14454 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=45 name=(null) inode=14455 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=46 name=(null) inode=14454 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=47 name=(null) inode=14456 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=48 name=(null) inode=14454 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=49 name=(null) inode=14457 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=50 name=(null) inode=14454 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=51 name=(null) inode=14458 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=52 name=(null) inode=14454 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=53 name=(null) inode=14459 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=55 name=(null) inode=14460 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=56 name=(null) inode=14460 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=57 name=(null) inode=14461 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=58 name=(null) inode=14460 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=59 name=(null) inode=14462 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=60 name=(null) inode=14460 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=61 name=(null) inode=14463 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=62 name=(null) inode=14463 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=63 name=(null) inode=14464 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=64 name=(null) inode=14463 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=65 name=(null) inode=14465 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=66 name=(null) inode=14463 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=67 name=(null) inode=14466 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=68 name=(null) inode=14463 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=69 name=(null) inode=14467 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=70 name=(null) inode=14463 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=71 name=(null) inode=14468 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=72 name=(null) inode=14460 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=73 name=(null) inode=14469 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.351121 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 May 15 09:22:48.355000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:48.309000 audit: PATH item=74 name=(null) inode=14469 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=75 name=(null) inode=14470 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=76 name=(null) inode=14469 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=77 name=(null) inode=14471 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=78 name=(null) inode=14469 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=79 name=(null) inode=14472 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=80 name=(null) inode=14469 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=81 name=(null) inode=14473 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=82 name=(null) inode=14469 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=83 name=(null) inode=14474 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=84 name=(null) inode=14460 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=85 name=(null) inode=14475 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=86 name=(null) inode=14475 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=87 name=(null) inode=14476 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=88 name=(null) inode=14475 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=89 name=(null) inode=14477 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=90 name=(null) inode=14475 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=91 name=(null) inode=14478 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=92 name=(null) inode=14475 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=93 name=(null) inode=14479 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=94 name=(null) inode=14475 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=95 name=(null) inode=14480 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=96 name=(null) inode=14460 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=97 name=(null) inode=14481 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=98 name=(null) inode=14481 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=99 name=(null) inode=14482 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=100 name=(null) inode=14481 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=101 name=(null) inode=14483 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=102 name=(null) inode=14481 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=103 name=(null) inode=14484 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=104 name=(null) inode=14481 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=105 name=(null) inode=14485 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=106 name=(null) inode=14481 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=107 name=(null) inode=14486 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PATH item=109 name=(null) inode=14487 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:22:48.309000 audit: PROCTITLE proctitle="(udev-worker)" May 15 09:22:48.354112 systemd-networkd[986]: lo: Link UP May 15 09:22:48.354118 systemd-networkd[986]: lo: Gained carrier May 15 09:22:48.354538 systemd-networkd[986]: Enumeration completed May 15 09:22:48.354825 systemd-networkd[986]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 15 09:22:48.354929 systemd[1]: Started systemd-networkd.service. May 15 09:22:48.357167 systemd-networkd[986]: eth0: Link UP May 15 09:22:48.357171 systemd-networkd[986]: eth0: Gained carrier May 15 09:22:48.368226 systemd-networkd[986]: eth0: DHCPv4 address 172.24.4.111/24, gateway 172.24.4.1 acquired from 172.24.4.1 May 15 09:22:48.381108 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 May 15 09:22:48.390126 kernel: mousedev: PS/2 mouse device common for all mice May 15 09:22:48.395345 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 15 09:22:48.437405 systemd[1]: Finished systemd-udev-settle.service. May 15 09:22:48.437000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:48.439037 systemd[1]: Starting lvm2-activation-early.service... May 15 09:22:48.468278 lvm[1006]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 15 09:22:48.507000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:48.507330 systemd[1]: Finished lvm2-activation-early.service. May 15 09:22:48.507909 systemd[1]: Reached target cryptsetup.target. May 15 09:22:48.509546 systemd[1]: Starting lvm2-activation.service... May 15 09:22:48.518800 lvm[1007]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 15 09:22:48.554047 systemd[1]: Finished lvm2-activation.service. May 15 09:22:48.555000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:48.555487 systemd[1]: Reached target local-fs-pre.target. May 15 09:22:48.556649 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 15 09:22:48.556712 systemd[1]: Reached target local-fs.target. May 15 09:22:48.557828 systemd[1]: Reached target machines.target. May 15 09:22:48.561429 systemd[1]: Starting ldconfig.service... May 15 09:22:48.564188 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 09:22:48.564278 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 09:22:48.566506 systemd[1]: Starting systemd-boot-update.service... May 15 09:22:48.570288 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 15 09:22:48.574427 systemd[1]: Starting systemd-machine-id-commit.service... May 15 09:22:48.586364 systemd[1]: Starting systemd-sysext.service... May 15 09:22:48.604430 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1009 (bootctl) May 15 09:22:48.607049 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 15 09:22:48.637479 systemd[1]: Unmounting usr-share-oem.mount... May 15 09:22:48.642276 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 15 09:22:48.643000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:48.654728 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 15 09:22:48.655354 systemd[1]: Unmounted usr-share-oem.mount. May 15 09:22:48.669185 kernel: loop0: detected capacity change from 0 to 205544 May 15 09:22:48.684655 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 15 09:22:48.685226 systemd[1]: Finished systemd-machine-id-commit.service. May 15 09:22:48.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:48.715171 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 15 09:22:48.746121 kernel: loop1: detected capacity change from 0 to 205544 May 15 09:22:48.778456 (sd-sysext)[1021]: Using extensions 'kubernetes'. May 15 09:22:48.781505 (sd-sysext)[1021]: Merged extensions into '/usr'. May 15 09:22:48.815776 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 09:22:48.818672 systemd[1]: Mounting usr-share-oem.mount... May 15 09:22:48.820438 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 09:22:48.824748 systemd[1]: Starting modprobe@dm_mod.service... May 15 09:22:48.826603 systemd[1]: Starting modprobe@efi_pstore.service... May 15 09:22:48.829704 systemd[1]: Starting modprobe@loop.service... May 15 09:22:48.830209 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 09:22:48.830314 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 09:22:48.830445 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 09:22:48.832000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:48.831800 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 09:22:48.831921 systemd[1]: Finished modprobe@dm_mod.service. May 15 09:22:48.832000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:48.833017 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 09:22:48.833000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:48.833271 systemd[1]: Finished modprobe@efi_pstore.service. May 15 09:22:48.833000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:48.834533 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 09:22:48.834674 systemd[1]: Finished modprobe@loop.service. May 15 09:22:48.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:48.835000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:48.835988 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 09:22:48.836124 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 09:22:48.844262 systemd[1]: Mounted usr-share-oem.mount. May 15 09:22:48.845907 systemd[1]: Finished systemd-sysext.service. May 15 09:22:48.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:48.848818 systemd[1]: Starting ensure-sysext.service... May 15 09:22:48.851421 systemd[1]: Starting systemd-tmpfiles-setup.service... May 15 09:22:48.862245 systemd[1]: Reloading. May 15 09:22:48.866255 systemd-fsck[1018]: fsck.fat 4.2 (2021-01-31) May 15 09:22:48.866255 systemd-fsck[1018]: /dev/vda1: 790 files, 120690/258078 clusters May 15 09:22:48.874455 systemd-tmpfiles[1028]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 15 09:22:48.876699 systemd-tmpfiles[1028]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 15 09:22:48.881227 systemd-tmpfiles[1028]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 15 09:22:48.971354 /usr/lib/systemd/system-generators/torcx-generator[1048]: time="2025-05-15T09:22:48Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 15 09:22:48.971786 /usr/lib/systemd/system-generators/torcx-generator[1048]: time="2025-05-15T09:22:48Z" level=info msg="torcx already run" May 15 09:22:49.092396 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 09:22:49.092418 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 09:22:49.120585 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 09:22:49.194000 audit: BPF prog-id=27 op=LOAD May 15 09:22:49.194000 audit: BPF prog-id=28 op=LOAD May 15 09:22:49.194000 audit: BPF prog-id=21 op=UNLOAD May 15 09:22:49.194000 audit: BPF prog-id=22 op=UNLOAD May 15 09:22:49.194000 audit: BPF prog-id=29 op=LOAD May 15 09:22:49.194000 audit: BPF prog-id=23 op=UNLOAD May 15 09:22:49.197000 audit: BPF prog-id=30 op=LOAD May 15 09:22:49.197000 audit: BPF prog-id=18 op=UNLOAD May 15 09:22:49.197000 audit: BPF prog-id=31 op=LOAD May 15 09:22:49.197000 audit: BPF prog-id=32 op=LOAD May 15 09:22:49.197000 audit: BPF prog-id=19 op=UNLOAD May 15 09:22:49.197000 audit: BPF prog-id=20 op=UNLOAD May 15 09:22:49.198000 audit: BPF prog-id=33 op=LOAD May 15 09:22:49.198000 audit: BPF prog-id=24 op=UNLOAD May 15 09:22:49.198000 audit: BPF prog-id=34 op=LOAD May 15 09:22:49.198000 audit: BPF prog-id=35 op=LOAD May 15 09:22:49.198000 audit: BPF prog-id=25 op=UNLOAD May 15 09:22:49.198000 audit: BPF prog-id=26 op=UNLOAD May 15 09:22:49.203653 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 15 09:22:49.204000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:49.209274 systemd[1]: Mounting boot.mount... May 15 09:22:49.224371 systemd[1]: Finished ensure-sysext.service. May 15 09:22:49.225000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:49.226605 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 09:22:49.226908 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 09:22:49.228691 systemd[1]: Starting modprobe@dm_mod.service... May 15 09:22:49.230724 systemd[1]: Starting modprobe@drm.service... May 15 09:22:49.233452 systemd[1]: Starting modprobe@efi_pstore.service... May 15 09:22:49.235644 systemd[1]: Starting modprobe@loop.service... May 15 09:22:49.237034 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 09:22:49.237228 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 09:22:49.238718 systemd[1]: Starting systemd-networkd-wait-online.service... May 15 09:22:49.239864 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 09:22:49.242917 systemd[1]: Mounted boot.mount. May 15 09:22:49.244792 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 09:22:49.248000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:49.248000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:49.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:49.249000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:49.245021 systemd[1]: Finished modprobe@dm_mod.service. May 15 09:22:49.249444 systemd[1]: modprobe@drm.service: Deactivated successfully. May 15 09:22:49.249565 systemd[1]: Finished modprobe@drm.service. May 15 09:22:49.250380 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 09:22:49.250494 systemd[1]: Finished modprobe@efi_pstore.service. May 15 09:22:49.251000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:49.251000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:49.251370 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 09:22:49.252163 systemd[1]: Finished modprobe@loop.service. May 15 09:22:49.253000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:49.253000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:49.253497 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 09:22:49.253538 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 09:22:49.276484 ldconfig[1008]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 15 09:22:49.282400 systemd[1]: Finished systemd-boot-update.service. May 15 09:22:49.282000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:49.290763 systemd[1]: Finished ldconfig.service. May 15 09:22:49.291000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:49.344847 systemd[1]: Finished systemd-tmpfiles-setup.service. May 15 09:22:49.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:49.346704 systemd[1]: Starting audit-rules.service... May 15 09:22:49.348160 systemd[1]: Starting clean-ca-certificates.service... May 15 09:22:49.350354 systemd[1]: Starting systemd-journal-catalog-update.service... May 15 09:22:49.355000 audit: BPF prog-id=36 op=LOAD May 15 09:22:49.356120 systemd[1]: Starting systemd-resolved.service... May 15 09:22:49.358000 audit: BPF prog-id=37 op=LOAD May 15 09:22:49.360203 systemd[1]: Starting systemd-timesyncd.service... May 15 09:22:49.361702 systemd[1]: Starting systemd-update-utmp.service... May 15 09:22:49.373383 systemd[1]: Finished clean-ca-certificates.service. May 15 09:22:49.374014 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 09:22:49.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:49.376000 audit[1107]: SYSTEM_BOOT pid=1107 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 15 09:22:49.378068 systemd[1]: Finished systemd-update-utmp.service. May 15 09:22:49.378000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:49.417369 systemd[1]: Finished systemd-journal-catalog-update.service. May 15 09:22:49.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:49.419281 systemd[1]: Starting systemd-update-done.service... May 15 09:22:49.426794 systemd[1]: Finished systemd-update-done.service. May 15 09:22:49.427000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:22:49.446000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 15 09:22:49.446000 audit[1123]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffca648d240 a2=420 a3=0 items=0 ppid=1102 pid=1123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:22:49.446000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 15 09:22:49.446703 augenrules[1123]: No rules May 15 09:22:49.448201 systemd[1]: Finished audit-rules.service. May 15 09:22:49.467162 systemd-resolved[1105]: Positive Trust Anchors: May 15 09:22:49.467178 systemd-resolved[1105]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 15 09:22:49.467216 systemd-resolved[1105]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 15 09:22:49.470165 systemd[1]: Started systemd-timesyncd.service. May 15 09:22:49.470854 systemd[1]: Reached target time-set.target. May 15 09:22:49.474868 systemd-resolved[1105]: Using system hostname 'ci-3510-3-7-n-9ad0e9ad1c.novalocal'. May 15 09:22:49.476519 systemd[1]: Started systemd-resolved.service. May 15 09:22:49.477014 systemd[1]: Reached target network.target. May 15 09:22:49.477462 systemd[1]: Reached target nss-lookup.target. May 15 09:22:49.477898 systemd[1]: Reached target sysinit.target. May 15 09:22:49.478489 systemd[1]: Started motdgen.path. May 15 09:22:49.478929 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 15 09:22:49.479567 systemd[1]: Started logrotate.timer. May 15 09:22:49.480065 systemd[1]: Started mdadm.timer. May 15 09:22:49.480494 systemd[1]: Started systemd-tmpfiles-clean.timer. May 15 09:22:49.480947 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 15 09:22:49.480978 systemd[1]: Reached target paths.target. May 15 09:22:49.481413 systemd[1]: Reached target timers.target. May 15 09:22:49.482118 systemd[1]: Listening on dbus.socket. May 15 09:22:49.483740 systemd[1]: Starting docker.socket... May 15 09:22:49.487480 systemd[1]: Listening on sshd.socket. May 15 09:22:49.488139 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 09:22:49.488522 systemd[1]: Listening on docker.socket. May 15 09:22:49.489145 systemd[1]: Reached target sockets.target. May 15 09:22:49.489654 systemd[1]: Reached target basic.target. May 15 09:22:49.490220 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 15 09:22:49.490309 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 15 09:22:49.491424 systemd[1]: Starting containerd.service... May 15 09:22:49.492945 systemd[1]: Starting coreos-metadata-sshkeys@core.service... May 15 09:22:49.497321 systemd[1]: Starting dbus.service... May 15 09:22:49.498946 systemd[1]: Starting enable-oem-cloudinit.service... May 15 09:22:49.501336 systemd[1]: Starting extend-filesystems.service... May 15 09:22:49.502236 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 15 09:22:49.504205 systemd[1]: Starting motdgen.service... May 15 09:22:49.507007 systemd[1]: Starting ssh-key-proc-cmdline.service... May 15 09:22:49.509706 systemd[1]: Starting sshd-keygen.service... May 15 09:22:49.516112 systemd[1]: Starting systemd-logind.service... May 15 09:22:49.519160 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 09:22:49.519215 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 15 09:22:49.519651 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 15 09:22:49.520410 systemd[1]: Starting update-engine.service... May 15 09:22:49.521805 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 15 09:22:49.532409 jq[1136]: false May 15 09:22:49.532682 jq[1144]: true May 15 09:22:49.543453 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 15 09:22:49.543632 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 15 09:22:49.557267 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 15 09:22:49.557428 systemd[1]: Finished ssh-key-proc-cmdline.service. May 15 09:22:49.563279 jq[1148]: true May 15 09:22:49.575753 extend-filesystems[1137]: Found loop1 May 15 09:22:49.583255 extend-filesystems[1137]: Found vda May 15 09:22:49.583871 extend-filesystems[1137]: Found vda1 May 15 09:22:49.585637 extend-filesystems[1137]: Found vda2 May 15 09:22:49.588135 extend-filesystems[1137]: Found vda3 May 15 09:22:49.588135 extend-filesystems[1137]: Found usr May 15 09:22:49.588135 extend-filesystems[1137]: Found vda4 May 15 09:22:49.588135 extend-filesystems[1137]: Found vda6 May 15 09:22:49.588135 extend-filesystems[1137]: Found vda7 May 15 09:22:49.588135 extend-filesystems[1137]: Found vda9 May 15 09:22:50.151847 extend-filesystems[1137]: Checking size of /dev/vda9 May 15 09:22:49.595581 dbus-daemon[1134]: [system] SELinux support is enabled May 15 09:22:49.590712 systemd[1]: motdgen.service: Deactivated successfully. May 15 09:22:49.590874 systemd[1]: Finished motdgen.service. May 15 09:22:49.595733 systemd[1]: Started dbus.service. May 15 09:22:50.151336 systemd-timesyncd[1106]: Contacted time server 216.229.4.69:123 (0.flatcar.pool.ntp.org). May 15 09:22:50.151380 systemd-timesyncd[1106]: Initial clock synchronization to Thu 2025-05-15 09:22:50.151211 UTC. May 15 09:22:50.152636 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 15 09:22:50.152660 systemd[1]: Reached target system-config.target. May 15 09:22:50.152779 systemd-resolved[1105]: Clock change detected. Flushing caches. May 15 09:22:50.159280 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 15 09:22:50.159301 systemd[1]: Reached target user-config.target. May 15 09:22:50.175832 extend-filesystems[1137]: Resized partition /dev/vda9 May 15 09:22:50.185128 systemd[1]: Created slice system-sshd.slice. May 15 09:22:50.189240 extend-filesystems[1183]: resize2fs 1.46.5 (30-Dec-2021) May 15 09:22:50.221151 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 2014203 blocks May 15 09:22:50.226112 kernel: EXT4-fs (vda9): resized filesystem to 2014203 May 15 09:22:50.284177 update_engine[1143]: I0515 09:22:50.268832 1143 main.cc:92] Flatcar Update Engine starting May 15 09:22:50.261315 systemd-networkd[986]: eth0: Gained IPv6LL May 15 09:22:50.263210 systemd[1]: Finished systemd-networkd-wait-online.service. May 15 09:22:50.263909 systemd[1]: Reached target network-online.target. May 15 09:22:50.284547 systemd-logind[1141]: Watching system buttons on /dev/input/event1 (Power Button) May 15 09:22:50.284569 systemd-logind[1141]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 15 09:22:50.285665 systemd[1]: Starting kubelet.service... May 15 09:22:50.290084 extend-filesystems[1183]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 15 09:22:50.290084 extend-filesystems[1183]: old_desc_blocks = 1, new_desc_blocks = 1 May 15 09:22:50.290084 extend-filesystems[1183]: The filesystem on /dev/vda9 is now 2014203 (4k) blocks long. May 15 09:22:50.286300 systemd-logind[1141]: New seat seat0. May 15 09:22:50.304147 update_engine[1143]: I0515 09:22:50.301872 1143 update_check_scheduler.cc:74] Next update check in 10m17s May 15 09:22:50.304187 bash[1180]: Updated "/home/core/.ssh/authorized_keys" May 15 09:22:50.304269 env[1150]: time="2025-05-15T09:22:50.296829314Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 15 09:22:50.304460 extend-filesystems[1137]: Resized filesystem in /dev/vda9 May 15 09:22:50.290515 systemd[1]: extend-filesystems.service: Deactivated successfully. May 15 09:22:50.290683 systemd[1]: Finished extend-filesystems.service. May 15 09:22:50.294137 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 15 09:22:50.295012 systemd[1]: Started systemd-logind.service. May 15 09:22:50.298555 systemd[1]: Started update-engine.service. May 15 09:22:50.300830 systemd[1]: Started locksmithd.service. May 15 09:22:50.362509 env[1150]: time="2025-05-15T09:22:50.362453082Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 15 09:22:50.362613 env[1150]: time="2025-05-15T09:22:50.362589067Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 15 09:22:50.364379 env[1150]: time="2025-05-15T09:22:50.364311938Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.181-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 15 09:22:50.364379 env[1150]: time="2025-05-15T09:22:50.364355630Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 15 09:22:50.364557 env[1150]: time="2025-05-15T09:22:50.364529055Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 15 09:22:50.364557 env[1150]: time="2025-05-15T09:22:50.364553762Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 15 09:22:50.364616 env[1150]: time="2025-05-15T09:22:50.364597083Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 15 09:22:50.364616 env[1150]: time="2025-05-15T09:22:50.364610398Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 15 09:22:50.364714 env[1150]: time="2025-05-15T09:22:50.364690769Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 15 09:22:50.364960 env[1150]: time="2025-05-15T09:22:50.364937281Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 15 09:22:50.365147 env[1150]: time="2025-05-15T09:22:50.365118431Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 15 09:22:50.365188 env[1150]: time="2025-05-15T09:22:50.365145031Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 15 09:22:50.365215 env[1150]: time="2025-05-15T09:22:50.365198821Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 15 09:22:50.365244 env[1150]: time="2025-05-15T09:22:50.365212998Z" level=info msg="metadata content store policy set" policy=shared May 15 09:22:50.382032 env[1150]: time="2025-05-15T09:22:50.381984884Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 15 09:22:50.382107 env[1150]: time="2025-05-15T09:22:50.382069282Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 15 09:22:50.382139 env[1150]: time="2025-05-15T09:22:50.382122341Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 15 09:22:50.382242 env[1150]: time="2025-05-15T09:22:50.382218562Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 15 09:22:50.382275 env[1150]: time="2025-05-15T09:22:50.382244270Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 15 09:22:50.382332 env[1150]: time="2025-05-15T09:22:50.382311035Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 15 09:22:50.382363 env[1150]: time="2025-05-15T09:22:50.382334509Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 15 09:22:50.382363 env[1150]: time="2025-05-15T09:22:50.382352373Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 15 09:22:50.382412 env[1150]: time="2025-05-15T09:22:50.382386276Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 15 09:22:50.382412 env[1150]: time="2025-05-15T09:22:50.382404591Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 15 09:22:50.382457 env[1150]: time="2025-05-15T09:22:50.382421022Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 15 09:22:50.382457 env[1150]: time="2025-05-15T09:22:50.382437062Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 15 09:22:50.382619 env[1150]: time="2025-05-15T09:22:50.382595419Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 15 09:22:50.382761 env[1150]: time="2025-05-15T09:22:50.382737084Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 15 09:22:50.383177 env[1150]: time="2025-05-15T09:22:50.383152744Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 15 09:22:50.383221 env[1150]: time="2025-05-15T09:22:50.383210993Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 15 09:22:50.383252 env[1150]: time="2025-05-15T09:22:50.383230680Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 15 09:22:50.383331 env[1150]: time="2025-05-15T09:22:50.383307655Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 15 09:22:50.383365 env[1150]: time="2025-05-15T09:22:50.383330798Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 15 09:22:50.383439 env[1150]: time="2025-05-15T09:22:50.383416408Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 15 09:22:50.383475 env[1150]: time="2025-05-15T09:22:50.383457115Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 15 09:22:50.383512 env[1150]: time="2025-05-15T09:22:50.383473936Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 15 09:22:50.383512 env[1150]: time="2025-05-15T09:22:50.383489706Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 15 09:22:50.383512 env[1150]: time="2025-05-15T09:22:50.383504293Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 15 09:22:50.383585 env[1150]: time="2025-05-15T09:22:50.383535682Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 15 09:22:50.383585 env[1150]: time="2025-05-15T09:22:50.383556070Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 15 09:22:50.383769 env[1150]: time="2025-05-15T09:22:50.383744243Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 15 09:22:50.383804 env[1150]: time="2025-05-15T09:22:50.383769511Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 15 09:22:50.383833 env[1150]: time="2025-05-15T09:22:50.383806841Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 15 09:22:50.383833 env[1150]: time="2025-05-15T09:22:50.383822741Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 15 09:22:50.383885 env[1150]: time="2025-05-15T09:22:50.383841235Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 15 09:22:50.383885 env[1150]: time="2025-05-15T09:22:50.383856514Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 15 09:22:50.383935 env[1150]: time="2025-05-15T09:22:50.383899264Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 15 09:22:50.383981 env[1150]: time="2025-05-15T09:22:50.383941503Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 15 09:22:50.384431 env[1150]: time="2025-05-15T09:22:50.384301619Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 15 09:22:50.387473 env[1150]: time="2025-05-15T09:22:50.384442042Z" level=info msg="Connect containerd service" May 15 09:22:50.387473 env[1150]: time="2025-05-15T09:22:50.384497025Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 15 09:22:50.387473 env[1150]: time="2025-05-15T09:22:50.386677855Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 15 09:22:50.387473 env[1150]: time="2025-05-15T09:22:50.386766852Z" level=info msg="Start subscribing containerd event" May 15 09:22:50.387473 env[1150]: time="2025-05-15T09:22:50.386811205Z" level=info msg="Start recovering state" May 15 09:22:50.387473 env[1150]: time="2025-05-15T09:22:50.386882068Z" level=info msg="Start event monitor" May 15 09:22:50.387473 env[1150]: time="2025-05-15T09:22:50.386894722Z" level=info msg="Start snapshots syncer" May 15 09:22:50.387473 env[1150]: time="2025-05-15T09:22:50.386904811Z" level=info msg="Start cni network conf syncer for default" May 15 09:22:50.387473 env[1150]: time="2025-05-15T09:22:50.386914199Z" level=info msg="Start streaming server" May 15 09:22:50.387971 env[1150]: time="2025-05-15T09:22:50.387931246Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 15 09:22:50.388024 env[1150]: time="2025-05-15T09:22:50.388002359Z" level=info msg=serving... address=/run/containerd/containerd.sock May 15 09:22:50.389338 env[1150]: time="2025-05-15T09:22:50.388065227Z" level=info msg="containerd successfully booted in 0.158585s" May 15 09:22:50.388161 systemd[1]: Started containerd.service. May 15 09:22:50.615082 locksmithd[1192]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 15 09:22:51.370259 sshd_keygen[1164]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 15 09:22:51.394722 systemd[1]: Finished sshd-keygen.service. May 15 09:22:51.398661 systemd[1]: Starting issuegen.service... May 15 09:22:51.401787 systemd[1]: Started sshd@0-172.24.4.111:22-172.24.4.1:49046.service. May 15 09:22:51.410554 systemd[1]: issuegen.service: Deactivated successfully. May 15 09:22:51.410730 systemd[1]: Finished issuegen.service. May 15 09:22:51.413138 systemd[1]: Starting systemd-user-sessions.service... May 15 09:22:51.423033 systemd[1]: Finished systemd-user-sessions.service. May 15 09:22:51.425412 systemd[1]: Started getty@tty1.service. May 15 09:22:51.427680 systemd[1]: Started serial-getty@ttyS0.service. May 15 09:22:51.428556 systemd[1]: Reached target getty.target. May 15 09:22:52.338870 sshd[1208]: Accepted publickey for core from 172.24.4.1 port 49046 ssh2: RSA SHA256:vJ9zbjAuBHH28yvNJG1HWXfmUhMk1gBB/I91kXne7ic May 15 09:22:52.343858 sshd[1208]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 09:22:52.372310 systemd[1]: Started kubelet.service. May 15 09:22:52.381189 systemd-logind[1141]: New session 1 of user core. May 15 09:22:52.385370 systemd[1]: Created slice user-500.slice. May 15 09:22:52.390338 systemd[1]: Starting user-runtime-dir@500.service... May 15 09:22:52.412813 systemd[1]: Finished user-runtime-dir@500.service. May 15 09:22:52.415014 systemd[1]: Starting user@500.service... May 15 09:22:52.420903 (systemd)[1219]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 15 09:22:52.518426 systemd[1219]: Queued start job for default target default.target. May 15 09:22:52.519204 systemd[1219]: Reached target paths.target. May 15 09:22:52.519333 systemd[1219]: Reached target sockets.target. May 15 09:22:52.519425 systemd[1219]: Reached target timers.target. May 15 09:22:52.519521 systemd[1219]: Reached target basic.target. May 15 09:22:52.519692 systemd[1]: Started user@500.service. May 15 09:22:52.521185 systemd[1]: Started session-1.scope. May 15 09:22:52.522507 systemd[1219]: Reached target default.target. May 15 09:22:52.523373 systemd[1219]: Startup finished in 95ms. May 15 09:22:53.003853 systemd[1]: Started sshd@1-172.24.4.111:22-172.24.4.1:49054.service. May 15 09:22:53.756858 kubelet[1217]: E0515 09:22:53.756812 1217 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 09:22:53.760576 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 09:22:53.760876 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 09:22:53.761440 systemd[1]: kubelet.service: Consumed 1.926s CPU time. May 15 09:22:54.901590 sshd[1233]: Accepted publickey for core from 172.24.4.1 port 49054 ssh2: RSA SHA256:vJ9zbjAuBHH28yvNJG1HWXfmUhMk1gBB/I91kXne7ic May 15 09:22:54.905240 sshd[1233]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 09:22:54.915600 systemd-logind[1141]: New session 2 of user core. May 15 09:22:54.916957 systemd[1]: Started session-2.scope. May 15 09:22:55.551410 sshd[1233]: pam_unix(sshd:session): session closed for user core May 15 09:22:55.556932 systemd[1]: Started sshd@2-172.24.4.111:22-172.24.4.1:57966.service. May 15 09:22:55.561481 systemd[1]: sshd@1-172.24.4.111:22-172.24.4.1:49054.service: Deactivated successfully. May 15 09:22:55.562918 systemd[1]: session-2.scope: Deactivated successfully. May 15 09:22:55.567017 systemd-logind[1141]: Session 2 logged out. Waiting for processes to exit. May 15 09:22:55.569507 systemd-logind[1141]: Removed session 2. May 15 09:22:56.766806 sshd[1239]: Accepted publickey for core from 172.24.4.1 port 57966 ssh2: RSA SHA256:vJ9zbjAuBHH28yvNJG1HWXfmUhMk1gBB/I91kXne7ic May 15 09:22:56.770006 sshd[1239]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 09:22:56.782014 systemd-logind[1141]: New session 3 of user core. May 15 09:22:56.782844 systemd[1]: Started session-3.scope. May 15 09:22:57.178610 coreos-metadata[1132]: May 15 09:22:57.178 WARN failed to locate config-drive, using the metadata service API instead May 15 09:22:57.277788 coreos-metadata[1132]: May 15 09:22:57.277 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 May 15 09:22:57.548293 sshd[1239]: pam_unix(sshd:session): session closed for user core May 15 09:22:57.552962 systemd[1]: sshd@2-172.24.4.111:22-172.24.4.1:57966.service: Deactivated successfully. May 15 09:22:57.554489 systemd[1]: session-3.scope: Deactivated successfully. May 15 09:22:57.555758 systemd-logind[1141]: Session 3 logged out. Waiting for processes to exit. May 15 09:22:57.557626 systemd-logind[1141]: Removed session 3. May 15 09:22:57.575724 coreos-metadata[1132]: May 15 09:22:57.575 INFO Fetch successful May 15 09:22:57.576000 coreos-metadata[1132]: May 15 09:22:57.575 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 May 15 09:22:57.592164 coreos-metadata[1132]: May 15 09:22:57.592 INFO Fetch successful May 15 09:22:57.598234 unknown[1132]: wrote ssh authorized keys file for user: core May 15 09:22:57.626875 update-ssh-keys[1247]: Updated "/home/core/.ssh/authorized_keys" May 15 09:22:57.627748 systemd[1]: Finished coreos-metadata-sshkeys@core.service. May 15 09:22:57.628722 systemd[1]: Reached target multi-user.target. May 15 09:22:57.631933 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 15 09:22:57.647865 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 15 09:22:57.648266 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 15 09:22:57.649507 systemd[1]: Startup finished in 1.038s (kernel) + 6.827s (initrd) + 14.560s (userspace) = 22.426s. May 15 09:23:03.947297 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 15 09:23:03.947738 systemd[1]: Stopped kubelet.service. May 15 09:23:03.947817 systemd[1]: kubelet.service: Consumed 1.926s CPU time. May 15 09:23:03.951625 systemd[1]: Starting kubelet.service... May 15 09:23:04.135659 systemd[1]: Started kubelet.service. May 15 09:23:04.401967 kubelet[1253]: E0515 09:23:04.401688 1253 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 09:23:04.409295 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 09:23:04.409581 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 09:23:07.563742 systemd[1]: Started sshd@3-172.24.4.111:22-172.24.4.1:57578.service. May 15 09:23:08.729829 sshd[1259]: Accepted publickey for core from 172.24.4.1 port 57578 ssh2: RSA SHA256:vJ9zbjAuBHH28yvNJG1HWXfmUhMk1gBB/I91kXne7ic May 15 09:23:08.733262 sshd[1259]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 09:23:08.742926 systemd-logind[1141]: New session 4 of user core. May 15 09:23:08.743737 systemd[1]: Started session-4.scope. May 15 09:23:09.472970 sshd[1259]: pam_unix(sshd:session): session closed for user core May 15 09:23:09.480353 systemd[1]: Started sshd@4-172.24.4.111:22-172.24.4.1:57580.service. May 15 09:23:09.483453 systemd[1]: sshd@3-172.24.4.111:22-172.24.4.1:57578.service: Deactivated successfully. May 15 09:23:09.484997 systemd[1]: session-4.scope: Deactivated successfully. May 15 09:23:09.488450 systemd-logind[1141]: Session 4 logged out. Waiting for processes to exit. May 15 09:23:09.490827 systemd-logind[1141]: Removed session 4. May 15 09:23:10.705063 sshd[1264]: Accepted publickey for core from 172.24.4.1 port 57580 ssh2: RSA SHA256:vJ9zbjAuBHH28yvNJG1HWXfmUhMk1gBB/I91kXne7ic May 15 09:23:10.708364 sshd[1264]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 09:23:10.718843 systemd-logind[1141]: New session 5 of user core. May 15 09:23:10.718874 systemd[1]: Started session-5.scope. May 15 09:23:11.339560 sshd[1264]: pam_unix(sshd:session): session closed for user core May 15 09:23:11.345556 systemd[1]: Started sshd@5-172.24.4.111:22-172.24.4.1:57592.service. May 15 09:23:11.347993 systemd[1]: sshd@4-172.24.4.111:22-172.24.4.1:57580.service: Deactivated successfully. May 15 09:23:11.349649 systemd[1]: session-5.scope: Deactivated successfully. May 15 09:23:11.351946 systemd-logind[1141]: Session 5 logged out. Waiting for processes to exit. May 15 09:23:11.355012 systemd-logind[1141]: Removed session 5. May 15 09:23:12.530000 sshd[1270]: Accepted publickey for core from 172.24.4.1 port 57592 ssh2: RSA SHA256:vJ9zbjAuBHH28yvNJG1HWXfmUhMk1gBB/I91kXne7ic May 15 09:23:12.533334 sshd[1270]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 09:23:12.543287 systemd-logind[1141]: New session 6 of user core. May 15 09:23:12.544032 systemd[1]: Started session-6.scope. May 15 09:23:13.311491 sshd[1270]: pam_unix(sshd:session): session closed for user core May 15 09:23:13.319964 systemd-logind[1141]: Session 6 logged out. Waiting for processes to exit. May 15 09:23:13.320483 systemd[1]: sshd@5-172.24.4.111:22-172.24.4.1:57592.service: Deactivated successfully. May 15 09:23:13.321761 systemd[1]: session-6.scope: Deactivated successfully. May 15 09:23:13.324921 systemd[1]: Started sshd@6-172.24.4.111:22-172.24.4.1:57596.service. May 15 09:23:13.328367 systemd-logind[1141]: Removed session 6. May 15 09:23:14.447150 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 15 09:23:14.447589 systemd[1]: Stopped kubelet.service. May 15 09:23:14.450623 systemd[1]: Starting kubelet.service... May 15 09:23:14.530375 sshd[1277]: Accepted publickey for core from 172.24.4.1 port 57596 ssh2: RSA SHA256:vJ9zbjAuBHH28yvNJG1HWXfmUhMk1gBB/I91kXne7ic May 15 09:23:14.533052 sshd[1277]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 09:23:14.544740 systemd[1]: Started session-7.scope. May 15 09:23:14.545826 systemd-logind[1141]: New session 7 of user core. May 15 09:23:14.685322 systemd[1]: Started kubelet.service. May 15 09:23:14.876315 kubelet[1284]: E0515 09:23:14.875231 1284 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 09:23:14.879945 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 09:23:14.880380 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 09:23:15.028002 sudo[1289]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 15 09:23:15.028612 sudo[1289]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 09:23:15.043458 dbus-daemon[1134]: \xd0\xfd\xb2\xf8DV: received setenforce notice (enforcing=-1723073184) May 15 09:23:15.046544 sudo[1289]: pam_unix(sudo:session): session closed for user root May 15 09:23:15.311676 sshd[1277]: pam_unix(sshd:session): session closed for user core May 15 09:23:15.319060 systemd[1]: Started sshd@7-172.24.4.111:22-172.24.4.1:56442.service. May 15 09:23:15.323479 systemd[1]: sshd@6-172.24.4.111:22-172.24.4.1:57596.service: Deactivated successfully. May 15 09:23:15.324963 systemd[1]: session-7.scope: Deactivated successfully. May 15 09:23:15.327800 systemd-logind[1141]: Session 7 logged out. Waiting for processes to exit. May 15 09:23:15.330433 systemd-logind[1141]: Removed session 7. May 15 09:23:16.529036 sshd[1292]: Accepted publickey for core from 172.24.4.1 port 56442 ssh2: RSA SHA256:vJ9zbjAuBHH28yvNJG1HWXfmUhMk1gBB/I91kXne7ic May 15 09:23:16.532607 sshd[1292]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 09:23:16.543384 systemd[1]: Started session-8.scope. May 15 09:23:16.544757 systemd-logind[1141]: New session 8 of user core. May 15 09:23:17.004440 sudo[1297]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 15 09:23:17.004977 sudo[1297]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 09:23:17.011325 sudo[1297]: pam_unix(sudo:session): session closed for user root May 15 09:23:17.022212 sudo[1296]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 15 09:23:17.023403 sudo[1296]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 09:23:17.044274 systemd[1]: Stopping audit-rules.service... May 15 09:23:17.045000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 15 09:23:17.050705 kernel: kauditd_printk_skb: 169 callbacks suppressed May 15 09:23:17.050835 kernel: audit: type=1305 audit(1747300997.045:205): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 15 09:23:17.057964 auditctl[1300]: No rules May 15 09:23:17.045000 audit[1300]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd9ff58f80 a2=420 a3=0 items=0 ppid=1 pid=1300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:17.073072 kernel: audit: type=1300 audit(1747300997.045:205): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd9ff58f80 a2=420 a3=0 items=0 ppid=1 pid=1300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:17.059443 systemd[1]: audit-rules.service: Deactivated successfully. May 15 09:23:17.059810 systemd[1]: Stopped audit-rules.service. May 15 09:23:17.045000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 15 09:23:17.075623 systemd[1]: Starting audit-rules.service... May 15 09:23:17.079367 kernel: audit: type=1327 audit(1747300997.045:205): proctitle=2F7362696E2F617564697463746C002D44 May 15 09:23:17.058000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:23:17.091512 kernel: audit: type=1131 audit(1747300997.058:206): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:23:17.120981 augenrules[1317]: No rules May 15 09:23:17.123040 systemd[1]: Finished audit-rules.service. May 15 09:23:17.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:23:17.125994 sudo[1296]: pam_unix(sudo:session): session closed for user root May 15 09:23:17.137132 kernel: audit: type=1130 audit(1747300997.122:207): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:23:17.124000 audit[1296]: USER_END pid=1296 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 09:23:17.125000 audit[1296]: CRED_DISP pid=1296 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 09:23:17.148623 kernel: audit: type=1106 audit(1747300997.124:208): pid=1296 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 09:23:17.148730 kernel: audit: type=1104 audit(1747300997.125:209): pid=1296 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 09:23:17.410608 sshd[1292]: pam_unix(sshd:session): session closed for user core May 15 09:23:17.417025 systemd[1]: sshd@7-172.24.4.111:22-172.24.4.1:56442.service: Deactivated successfully. May 15 09:23:17.411000 audit[1292]: USER_END pid=1292 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:17.418552 systemd[1]: session-8.scope: Deactivated successfully. May 15 09:23:17.435142 kernel: audit: type=1106 audit(1747300997.411:210): pid=1292 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:17.412000 audit[1292]: CRED_DISP pid=1292 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:17.443149 kernel: audit: type=1104 audit(1747300997.412:211): pid=1292 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:17.441977 systemd-logind[1141]: Session 8 logged out. Waiting for processes to exit. May 15 09:23:17.443171 systemd[1]: Started sshd@8-172.24.4.111:22-172.24.4.1:56456.service. May 15 09:23:17.416000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.24.4.111:22-172.24.4.1:56442 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:23:17.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.111:22-172.24.4.1:56456 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:23:17.459258 kernel: audit: type=1131 audit(1747300997.416:212): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.24.4.111:22-172.24.4.1:56442 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:23:17.459515 systemd-logind[1141]: Removed session 8. May 15 09:23:18.591000 audit[1323]: USER_ACCT pid=1323 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:18.593385 sshd[1323]: Accepted publickey for core from 172.24.4.1 port 56456 ssh2: RSA SHA256:vJ9zbjAuBHH28yvNJG1HWXfmUhMk1gBB/I91kXne7ic May 15 09:23:18.594000 audit[1323]: CRED_ACQ pid=1323 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:18.594000 audit[1323]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdfdf60d60 a2=3 a3=0 items=0 ppid=1 pid=1323 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:18.594000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 09:23:18.596667 sshd[1323]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 09:23:18.607825 systemd[1]: Started session-9.scope. May 15 09:23:18.610949 systemd-logind[1141]: New session 9 of user core. May 15 09:23:18.623000 audit[1323]: USER_START pid=1323 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:18.626000 audit[1325]: CRED_ACQ pid=1325 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:19.065000 audit[1326]: USER_ACCT pid=1326 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 09:23:19.067598 sudo[1326]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 15 09:23:19.067000 audit[1326]: CRED_REFR pid=1326 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 09:23:19.068946 sudo[1326]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 09:23:19.072000 audit[1326]: USER_START pid=1326 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 09:23:19.097221 systemd[1]: Starting coreos-metadata.service... May 15 09:23:24.947151 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. May 15 09:23:24.946000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:23:24.947786 systemd[1]: Stopped kubelet.service. May 15 09:23:24.957141 kernel: kauditd_printk_skb: 11 callbacks suppressed May 15 09:23:24.957308 kernel: audit: type=1130 audit(1747301004.946:222): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:23:24.951943 systemd[1]: Starting kubelet.service... May 15 09:23:24.946000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:23:24.976190 kernel: audit: type=1131 audit(1747301004.946:223): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:23:25.110521 systemd[1]: Started kubelet.service. May 15 09:23:25.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:23:25.118134 kernel: audit: type=1130 audit(1747301005.110:224): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:23:25.467162 kubelet[1339]: E0515 09:23:25.467014 1339 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 09:23:25.485566 kernel: audit: type=1131 audit(1747301005.470:225): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 09:23:25.470000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 09:23:25.470982 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 09:23:25.471319 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 09:23:26.165588 coreos-metadata[1330]: May 15 09:23:26.165 WARN failed to locate config-drive, using the metadata service API instead May 15 09:23:26.257374 coreos-metadata[1330]: May 15 09:23:26.257 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 May 15 09:23:26.543278 coreos-metadata[1330]: May 15 09:23:26.542 INFO Fetch successful May 15 09:23:26.543715 coreos-metadata[1330]: May 15 09:23:26.543 INFO Fetching http://169.254.169.254/latest/meta-data/instance-id: Attempt #1 May 15 09:23:26.558235 coreos-metadata[1330]: May 15 09:23:26.558 INFO Fetch successful May 15 09:23:26.558565 coreos-metadata[1330]: May 15 09:23:26.558 INFO Fetching http://169.254.169.254/latest/meta-data/instance-type: Attempt #1 May 15 09:23:26.572733 coreos-metadata[1330]: May 15 09:23:26.572 INFO Fetch successful May 15 09:23:26.573054 coreos-metadata[1330]: May 15 09:23:26.572 INFO Fetching http://169.254.169.254/latest/meta-data/local-ipv4: Attempt #1 May 15 09:23:26.586790 coreos-metadata[1330]: May 15 09:23:26.586 INFO Fetch successful May 15 09:23:26.587178 coreos-metadata[1330]: May 15 09:23:26.586 INFO Fetching http://169.254.169.254/latest/meta-data/public-ipv4: Attempt #1 May 15 09:23:26.602747 coreos-metadata[1330]: May 15 09:23:26.602 INFO Fetch successful May 15 09:23:26.620673 systemd[1]: Finished coreos-metadata.service. May 15 09:23:26.620000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:23:26.635176 kernel: audit: type=1130 audit(1747301006.620:226): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:23:28.049365 systemd[1]: Stopped kubelet.service. May 15 09:23:28.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:23:28.059828 systemd[1]: Starting kubelet.service... May 15 09:23:28.050000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:23:28.075965 kernel: audit: type=1130 audit(1747301008.050:227): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:23:28.078284 kernel: audit: type=1131 audit(1747301008.050:228): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:23:28.114319 systemd[1]: Reloading. May 15 09:23:28.246483 /usr/lib/systemd/system-generators/torcx-generator[1395]: time="2025-05-15T09:23:28Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 15 09:23:28.249266 /usr/lib/systemd/system-generators/torcx-generator[1395]: time="2025-05-15T09:23:28Z" level=info msg="torcx already run" May 15 09:23:28.476405 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 09:23:28.476431 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 09:23:28.499664 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 09:23:28.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.583941 kernel: audit: type=1400 audit(1747301008.573:229): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.584122 kernel: audit: type=1400 audit(1747301008.573:230): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.584181 kernel: audit: type=1400 audit(1747301008.573:231): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.588000 audit: BPF prog-id=43 op=LOAD May 15 09:23:28.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.588000 audit: BPF prog-id=44 op=LOAD May 15 09:23:28.588000 audit: BPF prog-id=27 op=UNLOAD May 15 09:23:28.588000 audit: BPF prog-id=28 op=UNLOAD May 15 09:23:28.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.589000 audit: BPF prog-id=45 op=LOAD May 15 09:23:28.589000 audit: BPF prog-id=37 op=UNLOAD May 15 09:23:28.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.591000 audit: BPF prog-id=46 op=LOAD May 15 09:23:28.591000 audit: BPF prog-id=29 op=UNLOAD May 15 09:23:28.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.597000 audit: BPF prog-id=47 op=LOAD May 15 09:23:28.597000 audit: BPF prog-id=38 op=UNLOAD May 15 09:23:28.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.597000 audit: BPF prog-id=48 op=LOAD May 15 09:23:28.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.597000 audit: BPF prog-id=49 op=LOAD May 15 09:23:28.598000 audit: BPF prog-id=39 op=UNLOAD May 15 09:23:28.598000 audit: BPF prog-id=40 op=UNLOAD May 15 09:23:28.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.599000 audit: BPF prog-id=50 op=LOAD May 15 09:23:28.599000 audit: BPF prog-id=30 op=UNLOAD May 15 09:23:28.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.599000 audit: BPF prog-id=51 op=LOAD May 15 09:23:28.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.599000 audit: BPF prog-id=52 op=LOAD May 15 09:23:28.599000 audit: BPF prog-id=31 op=UNLOAD May 15 09:23:28.599000 audit: BPF prog-id=32 op=UNLOAD May 15 09:23:28.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.603000 audit: BPF prog-id=53 op=LOAD May 15 09:23:28.603000 audit: BPF prog-id=36 op=UNLOAD May 15 09:23:28.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.604000 audit: BPF prog-id=54 op=LOAD May 15 09:23:28.604000 audit: BPF prog-id=33 op=UNLOAD May 15 09:23:28.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.605000 audit: BPF prog-id=55 op=LOAD May 15 09:23:28.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.605000 audit: BPF prog-id=56 op=LOAD May 15 09:23:28.605000 audit: BPF prog-id=34 op=UNLOAD May 15 09:23:28.605000 audit: BPF prog-id=35 op=UNLOAD May 15 09:23:28.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:28.606000 audit: BPF prog-id=57 op=LOAD May 15 09:23:28.606000 audit: BPF prog-id=41 op=UNLOAD May 15 09:23:28.643749 systemd[1]: Started kubelet.service. May 15 09:23:28.643000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:23:28.649943 systemd[1]: Stopping kubelet.service... May 15 09:23:28.651177 systemd[1]: kubelet.service: Deactivated successfully. May 15 09:23:28.651358 systemd[1]: Stopped kubelet.service. May 15 09:23:28.650000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:23:28.652885 systemd[1]: Starting kubelet.service... May 15 09:23:28.738000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:23:28.739282 systemd[1]: Started kubelet.service. May 15 09:23:28.789177 kubelet[1454]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 09:23:28.789177 kubelet[1454]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 15 09:23:28.789177 kubelet[1454]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 09:23:28.808293 kubelet[1454]: I0515 09:23:28.808067 1454 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 15 09:23:29.455551 kubelet[1454]: I0515 09:23:29.455489 1454 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" May 15 09:23:29.455551 kubelet[1454]: I0515 09:23:29.455524 1454 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 15 09:23:29.455828 kubelet[1454]: I0515 09:23:29.455799 1454 server.go:929] "Client rotation is on, will bootstrap in background" May 15 09:23:29.523967 kubelet[1454]: I0515 09:23:29.523896 1454 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 15 09:23:29.562271 kubelet[1454]: E0515 09:23:29.562206 1454 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 15 09:23:29.562697 kubelet[1454]: I0515 09:23:29.562649 1454 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 15 09:23:29.572749 kubelet[1454]: I0515 09:23:29.572703 1454 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 15 09:23:29.573242 kubelet[1454]: I0515 09:23:29.573211 1454 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" May 15 09:23:29.573720 kubelet[1454]: I0515 09:23:29.573655 1454 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 15 09:23:29.574358 kubelet[1454]: I0515 09:23:29.573864 1454 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"172.24.4.111","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 15 09:23:29.574714 kubelet[1454]: I0515 09:23:29.574685 1454 topology_manager.go:138] "Creating topology manager with none policy" May 15 09:23:29.574870 kubelet[1454]: I0515 09:23:29.574850 1454 container_manager_linux.go:300] "Creating device plugin manager" May 15 09:23:29.575300 kubelet[1454]: I0515 09:23:29.575263 1454 state_mem.go:36] "Initialized new in-memory state store" May 15 09:23:29.583855 kubelet[1454]: I0515 09:23:29.583769 1454 kubelet.go:408] "Attempting to sync node with API server" May 15 09:23:29.584137 kubelet[1454]: I0515 09:23:29.584061 1454 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" May 15 09:23:29.584458 kubelet[1454]: I0515 09:23:29.584430 1454 kubelet.go:314] "Adding apiserver pod source" May 15 09:23:29.584697 kubelet[1454]: I0515 09:23:29.584669 1454 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 15 09:23:29.588619 kubelet[1454]: E0515 09:23:29.587592 1454 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:23:29.588619 kubelet[1454]: E0515 09:23:29.587712 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:23:29.596827 kubelet[1454]: I0515 09:23:29.596787 1454 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 15 09:23:29.601569 kubelet[1454]: I0515 09:23:29.601534 1454 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 15 09:23:29.607491 kubelet[1454]: W0515 09:23:29.607458 1454 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 15 09:23:29.609423 kubelet[1454]: I0515 09:23:29.609391 1454 server.go:1269] "Started kubelet" May 15 09:23:29.624936 kubelet[1454]: I0515 09:23:29.624784 1454 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 15 09:23:29.625237 kubelet[1454]: I0515 09:23:29.625145 1454 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 15 09:23:29.626330 kubelet[1454]: I0515 09:23:29.626291 1454 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 15 09:23:29.627349 kubelet[1454]: I0515 09:23:29.627307 1454 server.go:460] "Adding debug handlers to kubelet server" May 15 09:23:29.639341 kubelet[1454]: E0515 09:23:29.638780 1454 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 15 09:23:29.639000 audit[1454]: AVC avc: denied { mac_admin } for pid=1454 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:29.639000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 09:23:29.639000 audit[1454]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00071e600 a1=c0007bf7d0 a2=c00071e5d0 a3=25 items=0 ppid=1 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:29.639000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 09:23:29.641300 kubelet[1454]: I0515 09:23:29.641216 1454 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 15 09:23:29.640000 audit[1454]: AVC avc: denied { mac_admin } for pid=1454 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:29.640000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 09:23:29.640000 audit[1454]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a5d5a0 a1=c0007bf7e8 a2=c00071e690 a3=25 items=0 ppid=1 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:29.640000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 09:23:29.642073 kubelet[1454]: I0515 09:23:29.642040 1454 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 15 09:23:29.642551 kubelet[1454]: I0515 09:23:29.642519 1454 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 15 09:23:29.645306 kubelet[1454]: I0515 09:23:29.645239 1454 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 15 09:23:29.647451 kubelet[1454]: I0515 09:23:29.647421 1454 volume_manager.go:289] "Starting Kubelet Volume Manager" May 15 09:23:29.648928 kubelet[1454]: E0515 09:23:29.648882 1454 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.24.4.111\" not found" May 15 09:23:29.650690 kubelet[1454]: I0515 09:23:29.650633 1454 desired_state_of_world_populator.go:146] "Desired state populator starts to run" May 15 09:23:29.650957 kubelet[1454]: I0515 09:23:29.650895 1454 reconciler.go:26] "Reconciler: start to sync state" May 15 09:23:29.652330 kubelet[1454]: I0515 09:23:29.652290 1454 factory.go:221] Registration of the systemd container factory successfully May 15 09:23:29.652616 kubelet[1454]: I0515 09:23:29.652525 1454 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 15 09:23:29.658564 kubelet[1454]: I0515 09:23:29.658507 1454 factory.go:221] Registration of the containerd container factory successfully May 15 09:23:29.663860 kubelet[1454]: E0515 09:23:29.663778 1454 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"172.24.4.111\" not found" node="172.24.4.111" May 15 09:23:29.677456 kubelet[1454]: I0515 09:23:29.677391 1454 cpu_manager.go:214] "Starting CPU manager" policy="none" May 15 09:23:29.677456 kubelet[1454]: I0515 09:23:29.677428 1454 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 15 09:23:29.677626 kubelet[1454]: I0515 09:23:29.677478 1454 state_mem.go:36] "Initialized new in-memory state store" May 15 09:23:29.683287 kubelet[1454]: I0515 09:23:29.683258 1454 policy_none.go:49] "None policy: Start" May 15 09:23:29.684362 kubelet[1454]: I0515 09:23:29.684329 1454 memory_manager.go:170] "Starting memorymanager" policy="None" May 15 09:23:29.684612 kubelet[1454]: I0515 09:23:29.684551 1454 state_mem.go:35] "Initializing new in-memory state store" May 15 09:23:29.694846 systemd[1]: Created slice kubepods.slice. May 15 09:23:29.702667 systemd[1]: Created slice kubepods-burstable.slice. May 15 09:23:29.714477 systemd[1]: Created slice kubepods-besteffort.slice. May 15 09:23:29.724066 kubelet[1454]: I0515 09:23:29.724040 1454 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 15 09:23:29.723000 audit[1454]: AVC avc: denied { mac_admin } for pid=1454 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:29.723000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 09:23:29.723000 audit[1454]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c5b5f0 a1=c000e80f30 a2=c000c5b5c0 a3=25 items=0 ppid=1 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:29.723000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 09:23:29.728213 kubelet[1454]: I0515 09:23:29.728154 1454 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 15 09:23:29.728380 kubelet[1454]: I0515 09:23:29.728352 1454 eviction_manager.go:189] "Eviction manager: starting control loop" May 15 09:23:29.728476 kubelet[1454]: I0515 09:23:29.728374 1454 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 15 09:23:29.727000 audit[1469]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1469 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:23:29.727000 audit[1469]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd66af9dd0 a2=0 a3=7ffd66af9dbc items=0 ppid=1454 pid=1469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:29.727000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 15 09:23:29.728808 kubelet[1454]: I0515 09:23:29.728796 1454 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 15 09:23:29.730842 kubelet[1454]: E0515 09:23:29.730819 1454 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"172.24.4.111\" not found" May 15 09:23:29.730000 audit[1473]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1473 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:23:29.730000 audit[1473]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffc9106fb80 a2=0 a3=7ffc9106fb6c items=0 ppid=1454 pid=1473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:29.730000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 15 09:23:29.732000 audit[1475]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1475 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:23:29.732000 audit[1475]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd44bbafc0 a2=0 a3=7ffd44bbafac items=0 ppid=1454 pid=1475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:29.732000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 09:23:29.753000 audit[1480]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1480 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:23:29.753000 audit[1480]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd03e4bac0 a2=0 a3=7ffd03e4baac items=0 ppid=1454 pid=1480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:29.753000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 09:23:29.808000 audit[1485]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1485 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:23:29.808000 audit[1485]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffec33ffc00 a2=0 a3=7ffec33ffbec items=0 ppid=1454 pid=1485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:29.808000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 15 09:23:29.810726 kubelet[1454]: I0515 09:23:29.810674 1454 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 15 09:23:29.810000 audit[1487]: NETFILTER_CFG table=mangle:7 family=2 entries=1 op=nft_register_chain pid=1487 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:23:29.810000 audit[1487]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffa5fdd420 a2=0 a3=7fffa5fdd40c items=0 ppid=1454 pid=1487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:29.810000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 15 09:23:29.811000 audit[1486]: NETFILTER_CFG table=mangle:8 family=10 entries=2 op=nft_register_chain pid=1486 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:23:29.811000 audit[1486]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcfe6e8dc0 a2=0 a3=7ffcfe6e8dac items=0 ppid=1454 pid=1486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:29.811000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 15 09:23:29.813217 kubelet[1454]: I0515 09:23:29.813201 1454 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 15 09:23:29.813349 kubelet[1454]: I0515 09:23:29.813337 1454 status_manager.go:217] "Starting to sync pod status with apiserver" May 15 09:23:29.813440 kubelet[1454]: I0515 09:23:29.813430 1454 kubelet.go:2321] "Starting kubelet main sync loop" May 15 09:23:29.813636 kubelet[1454]: E0515 09:23:29.813622 1454 kubelet.go:2345] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" May 15 09:23:29.814000 audit[1489]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1489 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:23:29.814000 audit[1489]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe73b27300 a2=0 a3=7ffe73b272ec items=0 ppid=1454 pid=1489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:29.814000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 15 09:23:29.814000 audit[1488]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=1488 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:23:29.814000 audit[1488]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff171851e0 a2=0 a3=7fff171851cc items=0 ppid=1454 pid=1488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:29.814000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 15 09:23:29.816000 audit[1490]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=1490 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:23:29.816000 audit[1490]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe9d547c90 a2=0 a3=7ffe9d547c7c items=0 ppid=1454 pid=1490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:29.816000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 15 09:23:29.817000 audit[1491]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1491 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:23:29.817000 audit[1491]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffffac2b010 a2=0 a3=7ffffac2affc items=0 ppid=1454 pid=1491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:29.817000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 15 09:23:29.818000 audit[1492]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1492 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:23:29.818000 audit[1492]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffca3252d40 a2=0 a3=7ffca3252d2c items=0 ppid=1454 pid=1492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:29.818000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 15 09:23:29.829973 kubelet[1454]: I0515 09:23:29.829944 1454 kubelet_node_status.go:72] "Attempting to register node" node="172.24.4.111" May 15 09:23:29.846312 kubelet[1454]: I0515 09:23:29.846291 1454 kubelet_node_status.go:75] "Successfully registered node" node="172.24.4.111" May 15 09:23:29.871942 kubelet[1454]: I0515 09:23:29.871833 1454 kuberuntime_manager.go:1633] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" May 15 09:23:29.872690 env[1150]: time="2025-05-15T09:23:29.872600766Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 15 09:23:29.873348 kubelet[1454]: I0515 09:23:29.873056 1454 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" May 15 09:23:30.279322 sudo[1326]: pam_unix(sudo:session): session closed for user root May 15 09:23:30.283659 kernel: kauditd_printk_skb: 220 callbacks suppressed May 15 09:23:30.283818 kernel: audit: type=1106 audit(1747301010.278:419): pid=1326 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 09:23:30.278000 audit[1326]: USER_END pid=1326 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 09:23:30.283000 audit[1326]: CRED_DISP pid=1326 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 09:23:30.313613 kernel: audit: type=1104 audit(1747301010.283:420): pid=1326 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 09:23:30.458665 kubelet[1454]: I0515 09:23:30.458515 1454 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" May 15 09:23:30.459073 kubelet[1454]: W0515 09:23:30.458892 1454 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 15 09:23:30.459523 kubelet[1454]: W0515 09:23:30.459435 1454 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.Service ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 15 09:23:30.459523 kubelet[1454]: W0515 09:23:30.459497 1454 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.CSIDriver ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 15 09:23:30.477687 sshd[1323]: pam_unix(sshd:session): session closed for user core May 15 09:23:30.478000 audit[1323]: USER_END pid=1323 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:30.482691 systemd[1]: sshd@8-172.24.4.111:22-172.24.4.1:56456.service: Deactivated successfully. May 15 09:23:30.484170 systemd[1]: session-9.scope: Deactivated successfully. May 15 09:23:30.484462 systemd[1]: session-9.scope: Consumed 1.156s CPU time. May 15 09:23:30.487199 systemd-logind[1141]: Session 9 logged out. Waiting for processes to exit. May 15 09:23:30.489934 systemd-logind[1141]: Removed session 9. May 15 09:23:30.479000 audit[1323]: CRED_DISP pid=1323 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:30.504337 kernel: audit: type=1106 audit(1747301010.478:421): pid=1323 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:30.504534 kernel: audit: type=1104 audit(1747301010.479:422): pid=1323 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:30.504592 kernel: audit: type=1131 audit(1747301010.480:423): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.111:22-172.24.4.1:56456 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:23:30.480000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.111:22-172.24.4.1:56456 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:23:30.588587 kubelet[1454]: E0515 09:23:30.588425 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:23:30.588820 kubelet[1454]: I0515 09:23:30.588473 1454 apiserver.go:52] "Watching apiserver" May 15 09:23:30.597836 kubelet[1454]: E0515 09:23:30.597756 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vstrf" podUID="ed417abd-ce43-46d6-b289-3aa9eba2746f" May 15 09:23:30.610018 systemd[1]: Created slice kubepods-besteffort-pod5a0c50b2_7c50_4a29_ac8b_af4f5d086479.slice. May 15 09:23:30.638145 systemd[1]: Created slice kubepods-besteffort-pod3458da6b_5b5e_488d_b27f_42a089c69845.slice. May 15 09:23:30.652665 kubelet[1454]: I0515 09:23:30.652545 1454 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" May 15 09:23:30.659449 kubelet[1454]: I0515 09:23:30.659339 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rb74p\" (UniqueName: \"kubernetes.io/projected/3458da6b-5b5e-488d-b27f-42a089c69845-kube-api-access-rb74p\") pod \"calico-node-glzd2\" (UID: \"3458da6b-5b5e-488d-b27f-42a089c69845\") " pod="calico-system/calico-node-glzd2" May 15 09:23:30.659768 kubelet[1454]: I0515 09:23:30.659488 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-szb4f\" (UniqueName: \"kubernetes.io/projected/5a0c50b2-7c50-4a29-ac8b-af4f5d086479-kube-api-access-szb4f\") pod \"kube-proxy-jbdxc\" (UID: \"5a0c50b2-7c50-4a29-ac8b-af4f5d086479\") " pod="kube-system/kube-proxy-jbdxc" May 15 09:23:30.659768 kubelet[1454]: I0515 09:23:30.659577 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/3458da6b-5b5e-488d-b27f-42a089c69845-xtables-lock\") pod \"calico-node-glzd2\" (UID: \"3458da6b-5b5e-488d-b27f-42a089c69845\") " pod="calico-system/calico-node-glzd2" May 15 09:23:30.659768 kubelet[1454]: I0515 09:23:30.659626 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/3458da6b-5b5e-488d-b27f-42a089c69845-tigera-ca-bundle\") pod \"calico-node-glzd2\" (UID: \"3458da6b-5b5e-488d-b27f-42a089c69845\") " pod="calico-system/calico-node-glzd2" May 15 09:23:30.659768 kubelet[1454]: I0515 09:23:30.659706 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/3458da6b-5b5e-488d-b27f-42a089c69845-var-run-calico\") pod \"calico-node-glzd2\" (UID: \"3458da6b-5b5e-488d-b27f-42a089c69845\") " pod="calico-system/calico-node-glzd2" May 15 09:23:30.660239 kubelet[1454]: I0515 09:23:30.659806 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/3458da6b-5b5e-488d-b27f-42a089c69845-cni-bin-dir\") pod \"calico-node-glzd2\" (UID: \"3458da6b-5b5e-488d-b27f-42a089c69845\") " pod="calico-system/calico-node-glzd2" May 15 09:23:30.660239 kubelet[1454]: I0515 09:23:30.659886 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/3458da6b-5b5e-488d-b27f-42a089c69845-cni-net-dir\") pod \"calico-node-glzd2\" (UID: \"3458da6b-5b5e-488d-b27f-42a089c69845\") " pod="calico-system/calico-node-glzd2" May 15 09:23:30.660239 kubelet[1454]: I0515 09:23:30.659930 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/5a0c50b2-7c50-4a29-ac8b-af4f5d086479-kube-proxy\") pod \"kube-proxy-jbdxc\" (UID: \"5a0c50b2-7c50-4a29-ac8b-af4f5d086479\") " pod="kube-system/kube-proxy-jbdxc" May 15 09:23:30.660239 kubelet[1454]: I0515 09:23:30.660013 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/3458da6b-5b5e-488d-b27f-42a089c69845-lib-modules\") pod \"calico-node-glzd2\" (UID: \"3458da6b-5b5e-488d-b27f-42a089c69845\") " pod="calico-system/calico-node-glzd2" May 15 09:23:30.660239 kubelet[1454]: I0515 09:23:30.660085 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/3458da6b-5b5e-488d-b27f-42a089c69845-var-lib-calico\") pod \"calico-node-glzd2\" (UID: \"3458da6b-5b5e-488d-b27f-42a089c69845\") " pod="calico-system/calico-node-glzd2" May 15 09:23:30.660721 kubelet[1454]: I0515 09:23:30.660265 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/3458da6b-5b5e-488d-b27f-42a089c69845-flexvol-driver-host\") pod \"calico-node-glzd2\" (UID: \"3458da6b-5b5e-488d-b27f-42a089c69845\") " pod="calico-system/calico-node-glzd2" May 15 09:23:30.660721 kubelet[1454]: I0515 09:23:30.660314 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/ed417abd-ce43-46d6-b289-3aa9eba2746f-varrun\") pod \"csi-node-driver-vstrf\" (UID: \"ed417abd-ce43-46d6-b289-3aa9eba2746f\") " pod="calico-system/csi-node-driver-vstrf" May 15 09:23:30.660721 kubelet[1454]: I0515 09:23:30.660396 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/ed417abd-ce43-46d6-b289-3aa9eba2746f-kubelet-dir\") pod \"csi-node-driver-vstrf\" (UID: \"ed417abd-ce43-46d6-b289-3aa9eba2746f\") " pod="calico-system/csi-node-driver-vstrf" May 15 09:23:30.660721 kubelet[1454]: I0515 09:23:30.660472 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/3458da6b-5b5e-488d-b27f-42a089c69845-policysync\") pod \"calico-node-glzd2\" (UID: \"3458da6b-5b5e-488d-b27f-42a089c69845\") " pod="calico-system/calico-node-glzd2" May 15 09:23:30.660721 kubelet[1454]: I0515 09:23:30.660512 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/3458da6b-5b5e-488d-b27f-42a089c69845-node-certs\") pod \"calico-node-glzd2\" (UID: \"3458da6b-5b5e-488d-b27f-42a089c69845\") " pod="calico-system/calico-node-glzd2" May 15 09:23:30.661238 kubelet[1454]: I0515 09:23:30.660591 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/ed417abd-ce43-46d6-b289-3aa9eba2746f-socket-dir\") pod \"csi-node-driver-vstrf\" (UID: \"ed417abd-ce43-46d6-b289-3aa9eba2746f\") " pod="calico-system/csi-node-driver-vstrf" May 15 09:23:30.661238 kubelet[1454]: I0515 09:23:30.660666 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/3458da6b-5b5e-488d-b27f-42a089c69845-cni-log-dir\") pod \"calico-node-glzd2\" (UID: \"3458da6b-5b5e-488d-b27f-42a089c69845\") " pod="calico-system/calico-node-glzd2" May 15 09:23:30.661238 kubelet[1454]: I0515 09:23:30.660709 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/ed417abd-ce43-46d6-b289-3aa9eba2746f-registration-dir\") pod \"csi-node-driver-vstrf\" (UID: \"ed417abd-ce43-46d6-b289-3aa9eba2746f\") " pod="calico-system/csi-node-driver-vstrf" May 15 09:23:30.661238 kubelet[1454]: I0515 09:23:30.660793 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wzzxf\" (UniqueName: \"kubernetes.io/projected/ed417abd-ce43-46d6-b289-3aa9eba2746f-kube-api-access-wzzxf\") pod \"csi-node-driver-vstrf\" (UID: \"ed417abd-ce43-46d6-b289-3aa9eba2746f\") " pod="calico-system/csi-node-driver-vstrf" May 15 09:23:30.661238 kubelet[1454]: I0515 09:23:30.660888 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/5a0c50b2-7c50-4a29-ac8b-af4f5d086479-xtables-lock\") pod \"kube-proxy-jbdxc\" (UID: \"5a0c50b2-7c50-4a29-ac8b-af4f5d086479\") " pod="kube-system/kube-proxy-jbdxc" May 15 09:23:30.661855 kubelet[1454]: I0515 09:23:30.660977 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/5a0c50b2-7c50-4a29-ac8b-af4f5d086479-lib-modules\") pod \"kube-proxy-jbdxc\" (UID: \"5a0c50b2-7c50-4a29-ac8b-af4f5d086479\") " pod="kube-system/kube-proxy-jbdxc" May 15 09:23:30.764962 kubelet[1454]: I0515 09:23:30.764891 1454 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 15 09:23:30.768255 kubelet[1454]: E0515 09:23:30.768163 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:23:30.768597 kubelet[1454]: W0515 09:23:30.768530 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:23:30.768946 kubelet[1454]: E0515 09:23:30.768901 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:23:30.769882 kubelet[1454]: E0515 09:23:30.769852 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:23:30.770130 kubelet[1454]: W0515 09:23:30.770050 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:23:30.770438 kubelet[1454]: E0515 09:23:30.770392 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:23:30.780170 kubelet[1454]: E0515 09:23:30.780084 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:23:30.780472 kubelet[1454]: W0515 09:23:30.780438 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:23:30.781041 kubelet[1454]: E0515 09:23:30.781016 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:23:30.781498 kubelet[1454]: W0515 09:23:30.781456 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:23:30.782145 kubelet[1454]: E0515 09:23:30.782066 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:23:30.782375 kubelet[1454]: W0515 09:23:30.782335 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:23:30.782734 kubelet[1454]: E0515 09:23:30.782580 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:23:30.782734 kubelet[1454]: E0515 09:23:30.782601 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:23:30.782734 kubelet[1454]: E0515 09:23:30.782731 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:23:30.783405 kubelet[1454]: E0515 09:23:30.783380 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:23:30.783592 kubelet[1454]: W0515 09:23:30.783565 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:23:30.783852 kubelet[1454]: E0515 09:23:30.783797 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:23:30.784572 kubelet[1454]: E0515 09:23:30.784536 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:23:30.784833 kubelet[1454]: W0515 09:23:30.784795 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:23:30.785203 kubelet[1454]: E0515 09:23:30.785079 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:23:30.785908 kubelet[1454]: E0515 09:23:30.785855 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:23:30.793526 kubelet[1454]: W0515 09:23:30.786063 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:23:30.793987 kubelet[1454]: E0515 09:23:30.793821 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:23:30.794219 kubelet[1454]: E0515 09:23:30.794068 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:23:30.794219 kubelet[1454]: W0515 09:23:30.794135 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:23:30.794372 kubelet[1454]: E0515 09:23:30.794280 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:23:30.794604 kubelet[1454]: E0515 09:23:30.794561 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:23:30.794604 kubelet[1454]: W0515 09:23:30.794587 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:23:30.796032 kubelet[1454]: E0515 09:23:30.796006 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:23:30.796777 kubelet[1454]: E0515 09:23:30.796756 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:23:30.797047 kubelet[1454]: W0515 09:23:30.796994 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:23:30.797500 kubelet[1454]: E0515 09:23:30.797466 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:23:30.797841 kubelet[1454]: E0515 09:23:30.797829 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:23:30.797937 kubelet[1454]: W0515 09:23:30.797924 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:23:30.798110 kubelet[1454]: E0515 09:23:30.798058 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:23:30.798278 kubelet[1454]: E0515 09:23:30.798267 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:23:30.798353 kubelet[1454]: W0515 09:23:30.798341 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:23:30.798498 kubelet[1454]: E0515 09:23:30.798467 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:23:30.798670 kubelet[1454]: E0515 09:23:30.798659 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:23:30.798755 kubelet[1454]: W0515 09:23:30.798741 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:23:30.798916 kubelet[1454]: E0515 09:23:30.798876 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:23:30.799074 kubelet[1454]: E0515 09:23:30.799062 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:23:30.799183 kubelet[1454]: W0515 09:23:30.799169 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:23:30.799305 kubelet[1454]: E0515 09:23:30.799271 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:23:30.799533 kubelet[1454]: E0515 09:23:30.799522 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:23:30.799612 kubelet[1454]: W0515 09:23:30.799600 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:23:30.799740 kubelet[1454]: E0515 09:23:30.799701 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:23:30.799962 kubelet[1454]: E0515 09:23:30.799940 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:23:30.800038 kubelet[1454]: W0515 09:23:30.800026 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:23:30.800177 kubelet[1454]: E0515 09:23:30.800138 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:23:30.800469 kubelet[1454]: E0515 09:23:30.800445 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:23:30.800556 kubelet[1454]: W0515 09:23:30.800543 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:23:30.800713 kubelet[1454]: E0515 09:23:30.800684 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:23:30.800870 kubelet[1454]: E0515 09:23:30.800859 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:23:30.800947 kubelet[1454]: W0515 09:23:30.800935 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:23:30.801054 kubelet[1454]: E0515 09:23:30.801022 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:23:30.801317 kubelet[1454]: E0515 09:23:30.801296 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:23:30.801398 kubelet[1454]: W0515 09:23:30.801386 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:23:30.801530 kubelet[1454]: E0515 09:23:30.801486 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:23:30.801681 kubelet[1454]: E0515 09:23:30.801670 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:23:30.801753 kubelet[1454]: W0515 09:23:30.801741 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:23:30.801938 kubelet[1454]: E0515 09:23:30.801913 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:23:30.802147 kubelet[1454]: E0515 09:23:30.802135 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:23:30.802230 kubelet[1454]: W0515 09:23:30.802218 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:23:30.802343 kubelet[1454]: E0515 09:23:30.802316 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:23:30.802635 kubelet[1454]: E0515 09:23:30.802623 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:23:30.802730 kubelet[1454]: W0515 09:23:30.802718 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:23:30.802864 kubelet[1454]: E0515 09:23:30.802820 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:23:30.803023 kubelet[1454]: E0515 09:23:30.803012 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:23:30.803111 kubelet[1454]: W0515 09:23:30.803083 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:23:30.803308 kubelet[1454]: E0515 09:23:30.803282 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:23:30.803484 kubelet[1454]: E0515 09:23:30.803463 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:23:30.803532 kubelet[1454]: W0515 09:23:30.803491 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:23:30.803663 kubelet[1454]: E0515 09:23:30.803634 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:23:30.803846 kubelet[1454]: E0515 09:23:30.803815 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:23:30.803891 kubelet[1454]: W0515 09:23:30.803842 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:23:30.804014 kubelet[1454]: E0515 09:23:30.803984 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:23:30.804243 kubelet[1454]: E0515 09:23:30.804216 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:23:30.804243 kubelet[1454]: W0515 09:23:30.804241 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:23:30.804381 kubelet[1454]: E0515 09:23:30.804364 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:23:30.804653 kubelet[1454]: E0515 09:23:30.804630 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:23:30.804704 kubelet[1454]: W0515 09:23:30.804658 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:23:30.804799 kubelet[1454]: E0515 09:23:30.804776 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:23:30.805070 kubelet[1454]: E0515 09:23:30.805048 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:23:30.805144 kubelet[1454]: W0515 09:23:30.805075 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:23:30.805252 kubelet[1454]: E0515 09:23:30.805229 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:23:30.805542 kubelet[1454]: E0515 09:23:30.805521 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:23:30.805585 kubelet[1454]: W0515 09:23:30.805547 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:23:30.805686 kubelet[1454]: E0515 09:23:30.805664 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:23:30.805947 kubelet[1454]: E0515 09:23:30.805926 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:23:30.805990 kubelet[1454]: W0515 09:23:30.805953 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:23:30.806126 kubelet[1454]: E0515 09:23:30.806067 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:23:30.806467 kubelet[1454]: E0515 09:23:30.806445 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:23:30.806521 kubelet[1454]: W0515 09:23:30.806474 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:23:30.806611 kubelet[1454]: E0515 09:23:30.806590 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:23:30.806907 kubelet[1454]: E0515 09:23:30.806885 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:23:30.806954 kubelet[1454]: W0515 09:23:30.806914 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:23:30.807056 kubelet[1454]: E0515 09:23:30.807034 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:23:30.807416 kubelet[1454]: E0515 09:23:30.807394 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:23:30.807467 kubelet[1454]: W0515 09:23:30.807422 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:23:30.807562 kubelet[1454]: E0515 09:23:30.807540 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:23:30.808339 kubelet[1454]: E0515 09:23:30.808303 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:23:30.808339 kubelet[1454]: W0515 09:23:30.808333 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:23:30.808479 kubelet[1454]: E0515 09:23:30.808448 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:23:30.809062 kubelet[1454]: E0515 09:23:30.809031 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:23:30.809152 kubelet[1454]: W0515 09:23:30.809066 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:23:30.809234 kubelet[1454]: E0515 09:23:30.809203 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:23:30.809534 kubelet[1454]: E0515 09:23:30.809504 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:23:30.809584 kubelet[1454]: W0515 09:23:30.809535 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:23:30.809674 kubelet[1454]: E0515 09:23:30.809651 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:23:30.809995 kubelet[1454]: E0515 09:23:30.809974 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:23:30.810043 kubelet[1454]: W0515 09:23:30.810002 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:23:30.810182 kubelet[1454]: E0515 09:23:30.810156 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:23:30.810477 kubelet[1454]: E0515 09:23:30.810455 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:23:30.810521 kubelet[1454]: W0515 09:23:30.810483 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:23:30.810521 kubelet[1454]: E0515 09:23:30.810504 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:23:30.812141 kubelet[1454]: E0515 09:23:30.812077 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:23:30.812484 kubelet[1454]: W0515 09:23:30.812142 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:23:30.812484 kubelet[1454]: E0515 09:23:30.812165 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:23:30.825754 kubelet[1454]: E0515 09:23:30.825733 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:23:30.825897 kubelet[1454]: W0515 09:23:30.825882 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:23:30.825970 kubelet[1454]: E0515 09:23:30.825958 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:23:30.840272 kubelet[1454]: E0515 09:23:30.840159 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:23:30.840462 kubelet[1454]: W0515 09:23:30.840444 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:23:30.840545 kubelet[1454]: E0515 09:23:30.840532 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:23:30.934361 env[1150]: time="2025-05-15T09:23:30.934256744Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-jbdxc,Uid:5a0c50b2-7c50-4a29-ac8b-af4f5d086479,Namespace:kube-system,Attempt:0,}" May 15 09:23:30.944760 env[1150]: time="2025-05-15T09:23:30.944490281Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-glzd2,Uid:3458da6b-5b5e-488d-b27f-42a089c69845,Namespace:calico-system,Attempt:0,}" May 15 09:23:31.589397 kubelet[1454]: E0515 09:23:31.589319 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:23:31.699973 env[1150]: time="2025-05-15T09:23:31.699849157Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:23:31.702901 env[1150]: time="2025-05-15T09:23:31.702810941Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:23:31.706974 env[1150]: time="2025-05-15T09:23:31.706901882Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:23:31.712074 env[1150]: time="2025-05-15T09:23:31.711977939Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:23:31.719005 env[1150]: time="2025-05-15T09:23:31.718948078Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:23:31.726628 env[1150]: time="2025-05-15T09:23:31.726525034Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:23:31.730128 env[1150]: time="2025-05-15T09:23:31.730031158Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:23:31.735849 env[1150]: time="2025-05-15T09:23:31.735710006Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:23:31.770597 env[1150]: time="2025-05-15T09:23:31.770492471Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 09:23:31.770783 env[1150]: time="2025-05-15T09:23:31.770627254Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 09:23:31.770783 env[1150]: time="2025-05-15T09:23:31.770705059Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 09:23:31.775520 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2151594961.mount: Deactivated successfully. May 15 09:23:31.779613 env[1150]: time="2025-05-15T09:23:31.779518845Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ac1b620d4f4e4b688b0fd1f909907596b0d33aed1caa07388088765150051e34 pid=1552 runtime=io.containerd.runc.v2 May 15 09:23:31.790385 env[1150]: time="2025-05-15T09:23:31.790230960Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 09:23:31.790385 env[1150]: time="2025-05-15T09:23:31.790266336Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 09:23:31.790385 env[1150]: time="2025-05-15T09:23:31.790279220Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 09:23:31.790686 env[1150]: time="2025-05-15T09:23:31.790617825Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/25a6557d8ab3c386ec3c13cf58c2e5dfaf749d56a48983322e46a8b3dd139456 pid=1558 runtime=io.containerd.runc.v2 May 15 09:23:31.812650 systemd[1]: Started cri-containerd-ac1b620d4f4e4b688b0fd1f909907596b0d33aed1caa07388088765150051e34.scope. May 15 09:23:31.835517 systemd[1]: Started cri-containerd-25a6557d8ab3c386ec3c13cf58c2e5dfaf749d56a48983322e46a8b3dd139456.scope. May 15 09:23:31.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.849512 kernel: audit: type=1400 audit(1747301011.838:424): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.849621 kernel: audit: type=1400 audit(1747301011.838:425): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.861944 kernel: audit: type=1400 audit(1747301011.838:426): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.862105 kernel: audit: type=1400 audit(1747301011.838:427): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.843000 audit: BPF prog-id=58 op=LOAD May 15 09:23:31.868245 kernel: audit: type=1400 audit(1747301011.838:428): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.848000 audit[1563]: AVC avc: denied { bpf } for pid=1563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.848000 audit[1563]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1552 pid=1563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:31.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163316236323064346634653462363838623066643166393039393037 May 15 09:23:31.848000 audit[1563]: AVC avc: denied { perfmon } for pid=1563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.848000 audit[1563]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=1552 pid=1563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:31.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163316236323064346634653462363838623066643166393039393037 May 15 09:23:31.849000 audit[1563]: AVC avc: denied { bpf } for pid=1563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.849000 audit[1563]: AVC avc: denied { bpf } for pid=1563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.849000 audit[1563]: AVC avc: denied { bpf } for pid=1563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.849000 audit[1563]: AVC avc: denied { perfmon } for pid=1563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.849000 audit[1563]: AVC avc: denied { perfmon } for pid=1563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.849000 audit[1563]: AVC avc: denied { perfmon } for pid=1563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.849000 audit[1563]: AVC avc: denied { perfmon } for pid=1563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.849000 audit[1563]: AVC avc: denied { perfmon } for pid=1563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.849000 audit[1563]: AVC avc: denied { bpf } for pid=1563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.849000 audit[1563]: AVC avc: denied { bpf } for pid=1563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.849000 audit: BPF prog-id=59 op=LOAD May 15 09:23:31.849000 audit[1563]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000221450 items=0 ppid=1552 pid=1563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:31.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163316236323064346634653462363838623066643166393039393037 May 15 09:23:31.850000 audit[1563]: AVC avc: denied { bpf } for pid=1563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.850000 audit[1563]: AVC avc: denied { bpf } for pid=1563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.850000 audit[1563]: AVC avc: denied { perfmon } for pid=1563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.850000 audit[1563]: AVC avc: denied { perfmon } for pid=1563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.850000 audit[1563]: AVC avc: denied { perfmon } for pid=1563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.850000 audit[1563]: AVC avc: denied { perfmon } for pid=1563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.850000 audit[1563]: AVC avc: denied { perfmon } for pid=1563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.850000 audit[1563]: AVC avc: denied { bpf } for pid=1563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.850000 audit[1563]: AVC avc: denied { bpf } for pid=1563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.850000 audit: BPF prog-id=60 op=LOAD May 15 09:23:31.850000 audit[1563]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000221498 items=0 ppid=1552 pid=1563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:31.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163316236323064346634653462363838623066643166393039393037 May 15 09:23:31.850000 audit: BPF prog-id=60 op=UNLOAD May 15 09:23:31.850000 audit: BPF prog-id=59 op=UNLOAD May 15 09:23:31.850000 audit[1563]: AVC avc: denied { bpf } for pid=1563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.850000 audit[1563]: AVC avc: denied { bpf } for pid=1563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.850000 audit[1563]: AVC avc: denied { bpf } for pid=1563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.850000 audit[1563]: AVC avc: denied { perfmon } for pid=1563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.850000 audit[1563]: AVC avc: denied { perfmon } for pid=1563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.850000 audit[1563]: AVC avc: denied { perfmon } for pid=1563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.850000 audit[1563]: AVC avc: denied { perfmon } for pid=1563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.850000 audit[1563]: AVC avc: denied { perfmon } for pid=1563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.850000 audit[1563]: AVC avc: denied { bpf } for pid=1563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.850000 audit[1563]: AVC avc: denied { bpf } for pid=1563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.850000 audit: BPF prog-id=61 op=LOAD May 15 09:23:31.850000 audit[1563]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0002218a8 items=0 ppid=1552 pid=1563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:31.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163316236323064346634653462363838623066643166393039393037 May 15 09:23:31.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.869000 audit[1578]: AVC avc: denied { bpf } for pid=1578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.869000 audit[1578]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1558 pid=1578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:31.869000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235613635353764386162336333383665633363313363663538633265 May 15 09:23:31.869000 audit[1578]: AVC avc: denied { perfmon } for pid=1578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.869000 audit[1578]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1558 pid=1578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:31.869000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235613635353764386162336333383665633363313363663538633265 May 15 09:23:31.869000 audit[1578]: AVC avc: denied { bpf } for pid=1578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.869000 audit[1578]: AVC avc: denied { bpf } for pid=1578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.869000 audit[1578]: AVC avc: denied { bpf } for pid=1578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.869000 audit[1578]: AVC avc: denied { perfmon } for pid=1578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.869000 audit[1578]: AVC avc: denied { perfmon } for pid=1578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.869000 audit[1578]: AVC avc: denied { perfmon } for pid=1578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.869000 audit[1578]: AVC avc: denied { perfmon } for pid=1578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.869000 audit[1578]: AVC avc: denied { perfmon } for pid=1578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.869000 audit[1578]: AVC avc: denied { bpf } for pid=1578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.869000 audit[1578]: AVC avc: denied { bpf } for pid=1578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.869000 audit: BPF prog-id=63 op=LOAD May 15 09:23:31.869000 audit[1578]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000350840 items=0 ppid=1558 pid=1578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:31.869000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235613635353764386162336333383665633363313363663538633265 May 15 09:23:31.869000 audit[1578]: AVC avc: denied { bpf } for pid=1578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.869000 audit[1578]: AVC avc: denied { bpf } for pid=1578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.869000 audit[1578]: AVC avc: denied { perfmon } for pid=1578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.869000 audit[1578]: AVC avc: denied { perfmon } for pid=1578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.869000 audit[1578]: AVC avc: denied { perfmon } for pid=1578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.869000 audit[1578]: AVC avc: denied { perfmon } for pid=1578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.869000 audit[1578]: AVC avc: denied { perfmon } for pid=1578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.869000 audit[1578]: AVC avc: denied { bpf } for pid=1578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.869000 audit[1578]: AVC avc: denied { bpf } for pid=1578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.869000 audit: BPF prog-id=64 op=LOAD May 15 09:23:31.869000 audit[1578]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000350888 items=0 ppid=1558 pid=1578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:31.869000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235613635353764386162336333383665633363313363663538633265 May 15 09:23:31.869000 audit: BPF prog-id=64 op=UNLOAD May 15 09:23:31.869000 audit: BPF prog-id=63 op=UNLOAD May 15 09:23:31.869000 audit[1578]: AVC avc: denied { bpf } for pid=1578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.869000 audit[1578]: AVC avc: denied { bpf } for pid=1578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.869000 audit[1578]: AVC avc: denied { bpf } for pid=1578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.869000 audit[1578]: AVC avc: denied { perfmon } for pid=1578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.869000 audit[1578]: AVC avc: denied { perfmon } for pid=1578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.869000 audit[1578]: AVC avc: denied { perfmon } for pid=1578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.869000 audit[1578]: AVC avc: denied { perfmon } for pid=1578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.869000 audit[1578]: AVC avc: denied { perfmon } for pid=1578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.869000 audit[1578]: AVC avc: denied { bpf } for pid=1578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.869000 audit[1578]: AVC avc: denied { bpf } for pid=1578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:31.869000 audit: BPF prog-id=65 op=LOAD May 15 09:23:31.869000 audit[1578]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000350c98 items=0 ppid=1558 pid=1578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:31.869000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235613635353764386162336333383665633363313363663538633265 May 15 09:23:31.888821 env[1150]: time="2025-05-15T09:23:31.888769253Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-glzd2,Uid:3458da6b-5b5e-488d-b27f-42a089c69845,Namespace:calico-system,Attempt:0,} returns sandbox id \"ac1b620d4f4e4b688b0fd1f909907596b0d33aed1caa07388088765150051e34\"" May 15 09:23:31.892154 env[1150]: time="2025-05-15T09:23:31.892068449Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 15 09:23:31.896721 env[1150]: time="2025-05-15T09:23:31.896676289Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-jbdxc,Uid:5a0c50b2-7c50-4a29-ac8b-af4f5d086479,Namespace:kube-system,Attempt:0,} returns sandbox id \"25a6557d8ab3c386ec3c13cf58c2e5dfaf749d56a48983322e46a8b3dd139456\"" May 15 09:23:32.590424 kubelet[1454]: E0515 09:23:32.590366 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:23:32.774388 systemd[1]: run-containerd-runc-k8s.io-ac1b620d4f4e4b688b0fd1f909907596b0d33aed1caa07388088765150051e34-runc.yqXBk1.mount: Deactivated successfully. May 15 09:23:32.814596 kubelet[1454]: E0515 09:23:32.814479 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vstrf" podUID="ed417abd-ce43-46d6-b289-3aa9eba2746f" May 15 09:23:33.590889 kubelet[1454]: E0515 09:23:33.590809 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:23:34.117829 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2545618754.mount: Deactivated successfully. May 15 09:23:34.319005 env[1150]: time="2025-05-15T09:23:34.318924563Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:23:34.322068 env[1150]: time="2025-05-15T09:23:34.322044113Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:23:34.324066 env[1150]: time="2025-05-15T09:23:34.324042690Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:23:34.327164 env[1150]: time="2025-05-15T09:23:34.327137604Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:23:34.328545 env[1150]: time="2025-05-15T09:23:34.328515096Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5\"" May 15 09:23:34.331666 env[1150]: time="2025-05-15T09:23:34.331625349Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.8\"" May 15 09:23:34.335106 env[1150]: time="2025-05-15T09:23:34.333992617Z" level=info msg="CreateContainer within sandbox \"ac1b620d4f4e4b688b0fd1f909907596b0d33aed1caa07388088765150051e34\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 15 09:23:34.351443 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1466774993.mount: Deactivated successfully. May 15 09:23:34.363917 env[1150]: time="2025-05-15T09:23:34.363847576Z" level=info msg="CreateContainer within sandbox \"ac1b620d4f4e4b688b0fd1f909907596b0d33aed1caa07388088765150051e34\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"963260256e1967f696d4d3e4e701562e3bc07942eb85540fbc09c7b0a03743a6\"" May 15 09:23:34.365010 env[1150]: time="2025-05-15T09:23:34.364984948Z" level=info msg="StartContainer for \"963260256e1967f696d4d3e4e701562e3bc07942eb85540fbc09c7b0a03743a6\"" May 15 09:23:34.397186 systemd[1]: Started cri-containerd-963260256e1967f696d4d3e4e701562e3bc07942eb85540fbc09c7b0a03743a6.scope. May 15 09:23:34.429000 audit[1627]: AVC avc: denied { perfmon } for pid=1627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:34.429000 audit[1627]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fa376b632f8 items=0 ppid=1552 pid=1627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:34.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936333236303235366531393637663639366434643365346537303135 May 15 09:23:34.429000 audit[1627]: AVC avc: denied { bpf } for pid=1627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:34.429000 audit[1627]: AVC avc: denied { bpf } for pid=1627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:34.429000 audit[1627]: AVC avc: denied { bpf } for pid=1627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:34.429000 audit[1627]: AVC avc: denied { perfmon } for pid=1627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:34.429000 audit[1627]: AVC avc: denied { perfmon } for pid=1627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:34.429000 audit[1627]: AVC avc: denied { perfmon } for pid=1627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:34.429000 audit[1627]: AVC avc: denied { perfmon } for pid=1627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:34.429000 audit[1627]: AVC avc: denied { perfmon } for pid=1627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:34.429000 audit[1627]: AVC avc: denied { bpf } for pid=1627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:34.429000 audit[1627]: AVC avc: denied { bpf } for pid=1627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:34.429000 audit: BPF prog-id=66 op=LOAD May 15 09:23:34.429000 audit[1627]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000024238 items=0 ppid=1552 pid=1627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:34.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936333236303235366531393637663639366434643365346537303135 May 15 09:23:34.429000 audit[1627]: AVC avc: denied { bpf } for pid=1627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:34.429000 audit[1627]: AVC avc: denied { bpf } for pid=1627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:34.429000 audit[1627]: AVC avc: denied { perfmon } for pid=1627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:34.429000 audit[1627]: AVC avc: denied { perfmon } for pid=1627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:34.429000 audit[1627]: AVC avc: denied { perfmon } for pid=1627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:34.429000 audit[1627]: AVC avc: denied { perfmon } for pid=1627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:34.429000 audit[1627]: AVC avc: denied { perfmon } for pid=1627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:34.429000 audit[1627]: AVC avc: denied { bpf } for pid=1627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:34.429000 audit[1627]: AVC avc: denied { bpf } for pid=1627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:34.429000 audit: BPF prog-id=67 op=LOAD May 15 09:23:34.429000 audit[1627]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000024288 items=0 ppid=1552 pid=1627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:34.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936333236303235366531393637663639366434643365346537303135 May 15 09:23:34.429000 audit: BPF prog-id=67 op=UNLOAD May 15 09:23:34.429000 audit: BPF prog-id=66 op=UNLOAD May 15 09:23:34.429000 audit[1627]: AVC avc: denied { bpf } for pid=1627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:34.429000 audit[1627]: AVC avc: denied { bpf } for pid=1627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:34.429000 audit[1627]: AVC avc: denied { bpf } for pid=1627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:34.429000 audit[1627]: AVC avc: denied { perfmon } for pid=1627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:34.429000 audit[1627]: AVC avc: denied { perfmon } for pid=1627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:34.429000 audit[1627]: AVC avc: denied { perfmon } for pid=1627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:34.429000 audit[1627]: AVC avc: denied { perfmon } for pid=1627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:34.429000 audit[1627]: AVC avc: denied { perfmon } for pid=1627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:34.429000 audit[1627]: AVC avc: denied { bpf } for pid=1627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:34.429000 audit[1627]: AVC avc: denied { bpf } for pid=1627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:34.429000 audit: BPF prog-id=68 op=LOAD May 15 09:23:34.429000 audit[1627]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000024318 items=0 ppid=1552 pid=1627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:34.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936333236303235366531393637663639366434643365346537303135 May 15 09:23:34.454714 env[1150]: time="2025-05-15T09:23:34.454652640Z" level=info msg="StartContainer for \"963260256e1967f696d4d3e4e701562e3bc07942eb85540fbc09c7b0a03743a6\" returns successfully" May 15 09:23:34.468797 systemd[1]: cri-containerd-963260256e1967f696d4d3e4e701562e3bc07942eb85540fbc09c7b0a03743a6.scope: Deactivated successfully. May 15 09:23:34.472000 audit: BPF prog-id=68 op=UNLOAD May 15 09:23:34.590826 env[1150]: time="2025-05-15T09:23:34.590771399Z" level=info msg="shim disconnected" id=963260256e1967f696d4d3e4e701562e3bc07942eb85540fbc09c7b0a03743a6 May 15 09:23:34.590826 env[1150]: time="2025-05-15T09:23:34.590824298Z" level=warning msg="cleaning up after shim disconnected" id=963260256e1967f696d4d3e4e701562e3bc07942eb85540fbc09c7b0a03743a6 namespace=k8s.io May 15 09:23:34.591129 env[1150]: time="2025-05-15T09:23:34.590837774Z" level=info msg="cleaning up dead shim" May 15 09:23:34.591622 kubelet[1454]: E0515 09:23:34.591524 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:23:34.603399 env[1150]: time="2025-05-15T09:23:34.603341258Z" level=warning msg="cleanup warnings time=\"2025-05-15T09:23:34Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1671 runtime=io.containerd.runc.v2\n" May 15 09:23:34.815852 kubelet[1454]: E0515 09:23:34.815221 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vstrf" podUID="ed417abd-ce43-46d6-b289-3aa9eba2746f" May 15 09:23:35.053827 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-963260256e1967f696d4d3e4e701562e3bc07942eb85540fbc09c7b0a03743a6-rootfs.mount: Deactivated successfully. May 15 09:23:35.224669 update_engine[1143]: I0515 09:23:35.224149 1143 update_attempter.cc:509] Updating boot flags... May 15 09:23:35.592316 kubelet[1454]: E0515 09:23:35.591913 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:23:36.025739 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount105986893.mount: Deactivated successfully. May 15 09:23:36.592328 kubelet[1454]: E0515 09:23:36.592149 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:23:36.814792 kubelet[1454]: E0515 09:23:36.814007 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vstrf" podUID="ed417abd-ce43-46d6-b289-3aa9eba2746f" May 15 09:23:37.060673 env[1150]: time="2025-05-15T09:23:37.060534859Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:23:37.063340 env[1150]: time="2025-05-15T09:23:37.063302539Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d73f013cedcf301aef42272c93e4c1174dab1a8eccd96840091ef04b63480f2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:23:37.065004 env[1150]: time="2025-05-15T09:23:37.064959406Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:23:37.066326 env[1150]: time="2025-05-15T09:23:37.066267568Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:dd0c9a37670f209947b1ed880f06a2e93e1d41da78c037f52f94b13858769838,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:23:37.067288 env[1150]: time="2025-05-15T09:23:37.067222049Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.8\" returns image reference \"sha256:7d73f013cedcf301aef42272c93e4c1174dab1a8eccd96840091ef04b63480f2\"" May 15 09:23:37.069741 env[1150]: time="2025-05-15T09:23:37.069694374Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 15 09:23:37.071305 env[1150]: time="2025-05-15T09:23:37.071236806Z" level=info msg="CreateContainer within sandbox \"25a6557d8ab3c386ec3c13cf58c2e5dfaf749d56a48983322e46a8b3dd139456\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 15 09:23:37.106407 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2291031791.mount: Deactivated successfully. May 15 09:23:37.113738 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3059729400.mount: Deactivated successfully. May 15 09:23:37.116611 env[1150]: time="2025-05-15T09:23:37.116534736Z" level=info msg="CreateContainer within sandbox \"25a6557d8ab3c386ec3c13cf58c2e5dfaf749d56a48983322e46a8b3dd139456\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"c6d03655a9c02b808215f029f6a325d96f3bb6732b3bff277be28f2d8fdaaeef\"" May 15 09:23:37.117639 env[1150]: time="2025-05-15T09:23:37.117571690Z" level=info msg="StartContainer for \"c6d03655a9c02b808215f029f6a325d96f3bb6732b3bff277be28f2d8fdaaeef\"" May 15 09:23:37.150276 systemd[1]: Started cri-containerd-c6d03655a9c02b808215f029f6a325d96f3bb6732b3bff277be28f2d8fdaaeef.scope. May 15 09:23:37.180736 kernel: kauditd_printk_skb: 159 callbacks suppressed May 15 09:23:37.180931 kernel: audit: type=1400 audit(1747301017.173:464): avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:37.173000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:37.173000 audit[1710]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bf6b0 a2=3c a3=7fa021da9808 items=0 ppid=1558 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:37.173000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336643033363535613963303262383038323135663032396636613332 May 15 09:23:37.194941 kernel: audit: type=1300 audit(1747301017.173:464): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bf6b0 a2=3c a3=7fa021da9808 items=0 ppid=1558 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:37.195056 kernel: audit: type=1327 audit(1747301017.173:464): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336643033363535613963303262383038323135663032396636613332 May 15 09:23:37.173000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:37.173000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:37.204251 kernel: audit: type=1400 audit(1747301017.173:465): avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:37.204301 kernel: audit: type=1400 audit(1747301017.173:465): avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:37.173000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:37.208950 kernel: audit: type=1400 audit(1747301017.173:465): avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:37.173000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:37.173000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:37.219686 kernel: audit: type=1400 audit(1747301017.173:465): avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:37.219737 kernel: audit: type=1400 audit(1747301017.173:465): avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:37.173000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:37.228176 kernel: audit: type=1400 audit(1747301017.173:465): avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:37.173000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:37.173000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:37.173000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:37.173000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:37.173000 audit: BPF prog-id=69 op=LOAD May 15 09:23:37.173000 audit[1710]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bf9d8 a2=78 a3=c0003ec398 items=0 ppid=1558 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:37.173000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336643033363535613963303262383038323135663032396636613332 May 15 09:23:37.175000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:37.175000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:37.175000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:37.175000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:37.175000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:37.175000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:37.175000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:37.175000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:37.175000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:37.175000 audit: BPF prog-id=70 op=LOAD May 15 09:23:37.234147 kernel: audit: type=1400 audit(1747301017.173:465): avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:37.175000 audit[1710]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bf770 a2=78 a3=c0003ec3e8 items=0 ppid=1558 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:37.175000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336643033363535613963303262383038323135663032396636613332 May 15 09:23:37.180000 audit: BPF prog-id=70 op=UNLOAD May 15 09:23:37.180000 audit: BPF prog-id=69 op=UNLOAD May 15 09:23:37.180000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:37.180000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:37.180000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:37.180000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:37.180000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:37.180000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:37.180000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:37.180000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:37.180000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:37.180000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:37.180000 audit: BPF prog-id=71 op=LOAD May 15 09:23:37.180000 audit[1710]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bfc30 a2=78 a3=c0003ec478 items=0 ppid=1558 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:37.180000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336643033363535613963303262383038323135663032396636613332 May 15 09:23:37.241179 env[1150]: time="2025-05-15T09:23:37.241132832Z" level=info msg="StartContainer for \"c6d03655a9c02b808215f029f6a325d96f3bb6732b3bff277be28f2d8fdaaeef\" returns successfully" May 15 09:23:37.367000 audit[1768]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1768 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:23:37.367000 audit[1768]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc48aac610 a2=0 a3=7ffc48aac5fc items=0 ppid=1721 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:37.367000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 15 09:23:37.371000 audit[1769]: NETFILTER_CFG table=nat:15 family=2 entries=1 op=nft_register_chain pid=1769 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:23:37.371000 audit[1769]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffef73b1a70 a2=0 a3=7ffef73b1a5c items=0 ppid=1721 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:37.371000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 15 09:23:37.374000 audit[1770]: NETFILTER_CFG table=mangle:16 family=10 entries=1 op=nft_register_chain pid=1770 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:23:37.374000 audit[1770]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd2abe4520 a2=0 a3=7ffd2abe450c items=0 ppid=1721 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:37.374000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 15 09:23:37.376000 audit[1771]: NETFILTER_CFG table=filter:17 family=2 entries=1 op=nft_register_chain pid=1771 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:23:37.376000 audit[1771]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc5e9c9730 a2=0 a3=7ffc5e9c971c items=0 ppid=1721 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:37.376000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 15 09:23:37.378000 audit[1772]: NETFILTER_CFG table=nat:18 family=10 entries=1 op=nft_register_chain pid=1772 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:23:37.378000 audit[1772]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc9ee132f0 a2=0 a3=7ffc9ee132dc items=0 ppid=1721 pid=1772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:37.378000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 15 09:23:37.381000 audit[1773]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1773 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:23:37.381000 audit[1773]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc3ffdf850 a2=0 a3=7ffc3ffdf83c items=0 ppid=1721 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:37.381000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 15 09:23:37.482000 audit[1774]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1774 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:23:37.482000 audit[1774]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fffd39f6020 a2=0 a3=7fffd39f600c items=0 ppid=1721 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:37.482000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 15 09:23:37.488000 audit[1776]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1776 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:23:37.488000 audit[1776]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffddc753f10 a2=0 a3=7ffddc753efc items=0 ppid=1721 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:37.488000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 15 09:23:37.499000 audit[1779]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1779 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:23:37.499000 audit[1779]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffec97ee900 a2=0 a3=7ffec97ee8ec items=0 ppid=1721 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:37.499000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 15 09:23:37.502000 audit[1780]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1780 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:23:37.502000 audit[1780]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffac5f4040 a2=0 a3=7fffac5f402c items=0 ppid=1721 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:37.502000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 15 09:23:37.508000 audit[1782]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1782 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:23:37.508000 audit[1782]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc2537c990 a2=0 a3=7ffc2537c97c items=0 ppid=1721 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:37.508000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 15 09:23:37.512000 audit[1783]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1783 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:23:37.512000 audit[1783]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc4181f570 a2=0 a3=7ffc4181f55c items=0 ppid=1721 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:37.512000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 15 09:23:37.518000 audit[1785]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1785 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:23:37.518000 audit[1785]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdf3b91710 a2=0 a3=7ffdf3b916fc items=0 ppid=1721 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:37.518000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 15 09:23:37.527000 audit[1788]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1788 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:23:37.527000 audit[1788]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff304b2740 a2=0 a3=7fff304b272c items=0 ppid=1721 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:37.527000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 15 09:23:37.530000 audit[1789]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1789 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:23:37.530000 audit[1789]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe1ea64010 a2=0 a3=7ffe1ea63ffc items=0 ppid=1721 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:37.530000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 15 09:23:37.536000 audit[1791]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1791 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:23:37.536000 audit[1791]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd88e79b80 a2=0 a3=7ffd88e79b6c items=0 ppid=1721 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:37.536000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 15 09:23:37.539000 audit[1792]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1792 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:23:37.539000 audit[1792]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe318f1e50 a2=0 a3=7ffe318f1e3c items=0 ppid=1721 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:37.539000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 15 09:23:37.545000 audit[1794]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1794 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:23:37.545000 audit[1794]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc8fca6980 a2=0 a3=7ffc8fca696c items=0 ppid=1721 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:37.545000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 09:23:37.553000 audit[1797]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1797 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:23:37.553000 audit[1797]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcb1377a60 a2=0 a3=7ffcb1377a4c items=0 ppid=1721 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:37.553000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 09:23:37.563000 audit[1800]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1800 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:23:37.563000 audit[1800]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffbf7e0de0 a2=0 a3=7fffbf7e0dcc items=0 ppid=1721 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:37.563000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 15 09:23:37.567000 audit[1801]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1801 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:23:37.567000 audit[1801]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd4cd0a970 a2=0 a3=7ffd4cd0a95c items=0 ppid=1721 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:37.567000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 15 09:23:37.593284 kubelet[1454]: E0515 09:23:37.593155 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:23:37.573000 audit[1803]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1803 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:23:37.573000 audit[1803]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd17cd2c80 a2=0 a3=7ffd17cd2c6c items=0 ppid=1721 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:37.573000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 09:23:37.632000 audit[1807]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1807 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:23:37.632000 audit[1807]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe83f61ab0 a2=0 a3=7ffe83f61a9c items=0 ppid=1721 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:37.632000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 09:23:37.633000 audit[1808]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1808 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:23:37.633000 audit[1808]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffce90ac070 a2=0 a3=7ffce90ac05c items=0 ppid=1721 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:37.633000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 15 09:23:37.638000 audit[1810]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1810 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:23:37.638000 audit[1810]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd0a8d8c20 a2=0 a3=7ffd0a8d8c0c items=0 ppid=1721 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:37.638000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 15 09:23:37.670000 audit[1816]: NETFILTER_CFG table=filter:39 family=2 entries=5 op=nft_register_rule pid=1816 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 09:23:37.670000 audit[1816]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffe8401daa0 a2=0 a3=7ffe8401da8c items=0 ppid=1721 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:37.670000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 09:23:37.698000 audit[1816]: NETFILTER_CFG table=nat:40 family=2 entries=65 op=nft_register_chain pid=1816 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 09:23:37.698000 audit[1816]: SYSCALL arch=c000003e syscall=46 success=yes exit=30940 a0=3 a1=7ffe8401daa0 a2=0 a3=7ffe8401da8c items=0 ppid=1721 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:37.698000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 09:23:37.716000 audit[1825]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1825 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:23:37.716000 audit[1825]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd45752340 a2=0 a3=7ffd4575232c items=0 ppid=1721 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:37.716000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 15 09:23:37.722000 audit[1827]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1827 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:23:37.722000 audit[1827]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdc8fbc2e0 a2=0 a3=7ffdc8fbc2cc items=0 ppid=1721 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:37.722000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 15 09:23:37.727000 audit[1830]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1830 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:23:37.727000 audit[1830]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdffdc9070 a2=0 a3=7ffdffdc905c items=0 ppid=1721 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:37.727000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 15 09:23:37.728000 audit[1831]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1831 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:23:37.728000 audit[1831]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe102643a0 a2=0 a3=7ffe1026438c items=0 ppid=1721 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:37.728000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 15 09:23:37.731000 audit[1833]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1833 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:23:37.731000 audit[1833]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffd0d75070 a2=0 a3=7fffd0d7505c items=0 ppid=1721 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:37.731000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 15 09:23:37.733000 audit[1834]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1834 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:23:37.733000 audit[1834]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff76d0a380 a2=0 a3=7fff76d0a36c items=0 ppid=1721 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:37.733000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 15 09:23:37.735000 audit[1836]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1836 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:23:37.735000 audit[1836]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc5c7e8e50 a2=0 a3=7ffc5c7e8e3c items=0 ppid=1721 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:37.735000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 15 09:23:37.739000 audit[1839]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1839 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:23:37.739000 audit[1839]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd2d8e2ae0 a2=0 a3=7ffd2d8e2acc items=0 ppid=1721 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:37.739000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 15 09:23:37.741000 audit[1840]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1840 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:23:37.741000 audit[1840]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe846d62d0 a2=0 a3=7ffe846d62bc items=0 ppid=1721 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:37.741000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 15 09:23:37.746000 audit[1842]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1842 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:23:37.746000 audit[1842]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffc36fe540 a2=0 a3=7fffc36fe52c items=0 ppid=1721 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:37.746000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 15 09:23:37.748000 audit[1843]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1843 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:23:37.748000 audit[1843]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff9afa13a0 a2=0 a3=7fff9afa138c items=0 ppid=1721 pid=1843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:37.748000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 15 09:23:37.751000 audit[1845]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1845 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:23:37.751000 audit[1845]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe239bc7d0 a2=0 a3=7ffe239bc7bc items=0 ppid=1721 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:37.751000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 09:23:37.756000 audit[1848]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1848 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:23:37.756000 audit[1848]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd74e3bcc0 a2=0 a3=7ffd74e3bcac items=0 ppid=1721 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:37.756000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 15 09:23:37.761000 audit[1851]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1851 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:23:37.761000 audit[1851]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff7f482590 a2=0 a3=7fff7f48257c items=0 ppid=1721 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:37.761000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 15 09:23:37.762000 audit[1852]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1852 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:23:37.762000 audit[1852]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd243f2c50 a2=0 a3=7ffd243f2c3c items=0 ppid=1721 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:37.762000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 15 09:23:37.765000 audit[1854]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1854 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:23:37.765000 audit[1854]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffcf8f823e0 a2=0 a3=7ffcf8f823cc items=0 ppid=1721 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:37.765000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 09:23:37.768000 audit[1857]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1857 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:23:37.768000 audit[1857]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffcd7ccf8f0 a2=0 a3=7ffcd7ccf8dc items=0 ppid=1721 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:37.768000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 09:23:37.770000 audit[1858]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1858 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:23:37.770000 audit[1858]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffefd290db0 a2=0 a3=7ffefd290d9c items=0 ppid=1721 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:37.770000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 15 09:23:37.773000 audit[1860]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1860 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:23:37.773000 audit[1860]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd310ec140 a2=0 a3=7ffd310ec12c items=0 ppid=1721 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:37.773000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 15 09:23:37.774000 audit[1861]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1861 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:23:37.774000 audit[1861]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff68028760 a2=0 a3=7fff6802874c items=0 ppid=1721 pid=1861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:37.774000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 15 09:23:37.779000 audit[1863]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1863 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:23:37.779000 audit[1863]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc0a05d280 a2=0 a3=7ffc0a05d26c items=0 ppid=1721 pid=1863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:37.779000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 09:23:37.785000 audit[1866]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1866 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:23:37.785000 audit[1866]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc7136e6d0 a2=0 a3=7ffc7136e6bc items=0 ppid=1721 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:37.785000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 09:23:37.790000 audit[1868]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1868 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 15 09:23:37.790000 audit[1868]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7fffbc917e00 a2=0 a3=7fffbc917dec items=0 ppid=1721 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:37.790000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 09:23:37.791000 audit[1868]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1868 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 15 09:23:37.791000 audit[1868]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fffbc917e00 a2=0 a3=7fffbc917dec items=0 ppid=1721 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:37.791000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 09:23:37.873123 kubelet[1454]: I0515 09:23:37.872928 1454 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-jbdxc" podStartSLOduration=3.702560674 podStartE2EDuration="8.872859941s" podCreationTimestamp="2025-05-15 09:23:29 +0000 UTC" firstStartedPulling="2025-05-15 09:23:31.898453381 +0000 UTC m=+3.151287303" lastFinishedPulling="2025-05-15 09:23:37.068752658 +0000 UTC m=+8.321586570" observedRunningTime="2025-05-15 09:23:37.871935537 +0000 UTC m=+9.124769499" watchObservedRunningTime="2025-05-15 09:23:37.872859941 +0000 UTC m=+9.125693903" May 15 09:23:38.594367 kubelet[1454]: E0515 09:23:38.594311 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:23:38.814964 kubelet[1454]: E0515 09:23:38.814892 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vstrf" podUID="ed417abd-ce43-46d6-b289-3aa9eba2746f" May 15 09:23:39.595781 kubelet[1454]: E0515 09:23:39.595662 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:23:40.596226 kubelet[1454]: E0515 09:23:40.596027 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:23:40.814596 kubelet[1454]: E0515 09:23:40.814507 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vstrf" podUID="ed417abd-ce43-46d6-b289-3aa9eba2746f" May 15 09:23:41.596992 kubelet[1454]: E0515 09:23:41.596897 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:23:42.597336 kubelet[1454]: E0515 09:23:42.597252 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:23:42.815779 kubelet[1454]: E0515 09:23:42.814950 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vstrf" podUID="ed417abd-ce43-46d6-b289-3aa9eba2746f" May 15 09:23:43.597613 kubelet[1454]: E0515 09:23:43.597511 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:23:44.598029 kubelet[1454]: E0515 09:23:44.597909 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:23:44.793347 env[1150]: time="2025-05-15T09:23:44.792206749Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:23:44.797020 env[1150]: time="2025-05-15T09:23:44.796945976Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:23:44.800082 env[1150]: time="2025-05-15T09:23:44.800006545Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:23:44.803307 env[1150]: time="2025-05-15T09:23:44.802862491Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:23:44.803307 env[1150]: time="2025-05-15T09:23:44.803183853Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9\"" May 15 09:23:44.810532 env[1150]: time="2025-05-15T09:23:44.810456612Z" level=info msg="CreateContainer within sandbox \"ac1b620d4f4e4b688b0fd1f909907596b0d33aed1caa07388088765150051e34\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 15 09:23:44.814766 kubelet[1454]: E0515 09:23:44.814671 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vstrf" podUID="ed417abd-ce43-46d6-b289-3aa9eba2746f" May 15 09:23:44.838425 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount352778642.mount: Deactivated successfully. May 15 09:23:44.854334 env[1150]: time="2025-05-15T09:23:44.852447637Z" level=info msg="CreateContainer within sandbox \"ac1b620d4f4e4b688b0fd1f909907596b0d33aed1caa07388088765150051e34\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"e71719c7c92710ff5b50640c39c13db0b90bb88df3126a29b76f562a0031a766\"" May 15 09:23:44.854334 env[1150]: time="2025-05-15T09:23:44.853295556Z" level=info msg="StartContainer for \"e71719c7c92710ff5b50640c39c13db0b90bb88df3126a29b76f562a0031a766\"" May 15 09:23:44.899462 systemd[1]: run-containerd-runc-k8s.io-e71719c7c92710ff5b50640c39c13db0b90bb88df3126a29b76f562a0031a766-runc.1bSe4j.mount: Deactivated successfully. May 15 09:23:44.908422 systemd[1]: Started cri-containerd-e71719c7c92710ff5b50640c39c13db0b90bb88df3126a29b76f562a0031a766.scope. May 15 09:23:44.932000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:44.934836 kernel: kauditd_printk_skb: 186 callbacks suppressed May 15 09:23:44.934971 kernel: audit: type=1400 audit(1747301024.932:521): avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:44.940286 kernel: audit: type=1300 audit(1747301024.932:521): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f5c51a15d58 items=0 ppid=1552 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:44.932000 audit[1877]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f5c51a15d58 items=0 ppid=1552 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:44.932000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537313731396337633932373130666635623530363430633339633133 May 15 09:23:44.956106 kernel: audit: type=1327 audit(1747301024.932:521): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537313731396337633932373130666635623530363430633339633133 May 15 09:23:44.932000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:44.974243 kernel: audit: type=1400 audit(1747301024.932:522): avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:44.975009 kernel: audit: type=1400 audit(1747301024.932:522): avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:44.975129 kernel: audit: type=1400 audit(1747301024.932:522): avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:44.975195 kernel: audit: type=1400 audit(1747301024.932:522): avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:44.932000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:44.932000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:44.932000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:44.932000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:44.987412 kernel: audit: type=1400 audit(1747301024.932:522): avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:44.932000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:44.992595 kernel: audit: type=1400 audit(1747301024.932:522): avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:44.932000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:44.999604 kernel: audit: type=1400 audit(1747301024.932:522): avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:44.932000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:44.932000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:44.932000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:44.932000 audit: BPF prog-id=72 op=LOAD May 15 09:23:44.932000 audit[1877]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000283008 items=0 ppid=1552 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:44.932000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537313731396337633932373130666635623530363430633339633133 May 15 09:23:44.938000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:44.938000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:44.938000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:44.938000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:44.938000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:44.938000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:44.938000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:44.938000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:44.938000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:44.938000 audit: BPF prog-id=73 op=LOAD May 15 09:23:44.938000 audit[1877]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000283058 items=0 ppid=1552 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:44.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537313731396337633932373130666635623530363430633339633133 May 15 09:23:44.939000 audit: BPF prog-id=73 op=UNLOAD May 15 09:23:44.939000 audit: BPF prog-id=72 op=UNLOAD May 15 09:23:44.939000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:44.939000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:44.939000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:44.939000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:44.939000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:44.939000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:44.939000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:44.939000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:44.939000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:44.939000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:23:44.939000 audit: BPF prog-id=74 op=LOAD May 15 09:23:44.939000 audit[1877]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002830e8 items=0 ppid=1552 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:44.939000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537313731396337633932373130666635623530363430633339633133 May 15 09:23:45.093331 env[1150]: time="2025-05-15T09:23:45.093229677Z" level=info msg="StartContainer for \"e71719c7c92710ff5b50640c39c13db0b90bb88df3126a29b76f562a0031a766\" returns successfully" May 15 09:23:45.598539 kubelet[1454]: E0515 09:23:45.598478 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:23:46.509394 env[1150]: time="2025-05-15T09:23:46.508547397Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 15 09:23:46.513422 systemd[1]: cri-containerd-e71719c7c92710ff5b50640c39c13db0b90bb88df3126a29b76f562a0031a766.scope: Deactivated successfully. May 15 09:23:46.516000 audit: BPF prog-id=74 op=UNLOAD May 15 09:23:46.574516 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e71719c7c92710ff5b50640c39c13db0b90bb88df3126a29b76f562a0031a766-rootfs.mount: Deactivated successfully. May 15 09:23:46.592831 kubelet[1454]: I0515 09:23:46.592755 1454 kubelet_node_status.go:488] "Fast updating node status as it just became ready" May 15 09:23:46.600482 kubelet[1454]: E0515 09:23:46.600194 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:23:46.828752 systemd[1]: Created slice kubepods-besteffort-poded417abd_ce43_46d6_b289_3aa9eba2746f.slice. May 15 09:23:47.036397 env[1150]: time="2025-05-15T09:23:47.034898810Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-vstrf,Uid:ed417abd-ce43-46d6-b289-3aa9eba2746f,Namespace:calico-system,Attempt:0,}" May 15 09:23:47.601341 kubelet[1454]: E0515 09:23:47.601242 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:23:48.083811 env[1150]: time="2025-05-15T09:23:48.083701835Z" level=info msg="shim disconnected" id=e71719c7c92710ff5b50640c39c13db0b90bb88df3126a29b76f562a0031a766 May 15 09:23:48.083811 env[1150]: time="2025-05-15T09:23:48.083802324Z" level=warning msg="cleaning up after shim disconnected" id=e71719c7c92710ff5b50640c39c13db0b90bb88df3126a29b76f562a0031a766 namespace=k8s.io May 15 09:23:48.084724 env[1150]: time="2025-05-15T09:23:48.083829455Z" level=info msg="cleaning up dead shim" May 15 09:23:48.164256 env[1150]: time="2025-05-15T09:23:48.164193643Z" level=warning msg="cleanup warnings time=\"2025-05-15T09:23:48Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1920 runtime=io.containerd.runc.v2\n" May 15 09:23:48.211628 env[1150]: time="2025-05-15T09:23:48.211493765Z" level=error msg="Failed to destroy network for sandbox \"3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 09:23:48.216632 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f-shm.mount: Deactivated successfully. May 15 09:23:48.217947 env[1150]: time="2025-05-15T09:23:48.217840778Z" level=error msg="encountered an error cleaning up failed sandbox \"3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 09:23:48.218019 env[1150]: time="2025-05-15T09:23:48.217934474Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-vstrf,Uid:ed417abd-ce43-46d6-b289-3aa9eba2746f,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 09:23:48.218628 kubelet[1454]: E0515 09:23:48.218293 1454 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 09:23:48.218628 kubelet[1454]: E0515 09:23:48.218453 1454 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-vstrf" May 15 09:23:48.218628 kubelet[1454]: E0515 09:23:48.218497 1454 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-vstrf" May 15 09:23:48.218815 kubelet[1454]: E0515 09:23:48.218568 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-vstrf_calico-system(ed417abd-ce43-46d6-b289-3aa9eba2746f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-vstrf_calico-system(ed417abd-ce43-46d6-b289-3aa9eba2746f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-vstrf" podUID="ed417abd-ce43-46d6-b289-3aa9eba2746f" May 15 09:23:48.603199 kubelet[1454]: E0515 09:23:48.603010 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:23:48.905969 env[1150]: time="2025-05-15T09:23:48.905635911Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 15 09:23:48.909194 kubelet[1454]: I0515 09:23:48.909008 1454 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f" May 15 09:23:48.917301 env[1150]: time="2025-05-15T09:23:48.916959055Z" level=info msg="StopPodSandbox for \"3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f\"" May 15 09:23:48.992703 env[1150]: time="2025-05-15T09:23:48.992524775Z" level=error msg="StopPodSandbox for \"3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f\" failed" error="failed to destroy network for sandbox \"3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 09:23:48.993943 kubelet[1454]: E0515 09:23:48.993730 1454 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f" May 15 09:23:48.994664 kubelet[1454]: E0515 09:23:48.994212 1454 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f"} May 15 09:23:48.994960 kubelet[1454]: E0515 09:23:48.994803 1454 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ed417abd-ce43-46d6-b289-3aa9eba2746f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 09:23:48.995435 kubelet[1454]: E0515 09:23:48.995148 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ed417abd-ce43-46d6-b289-3aa9eba2746f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-vstrf" podUID="ed417abd-ce43-46d6-b289-3aa9eba2746f" May 15 09:23:49.585874 kubelet[1454]: E0515 09:23:49.585725 1454 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:23:49.604569 kubelet[1454]: E0515 09:23:49.604422 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:23:50.604652 kubelet[1454]: E0515 09:23:50.604582 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:23:51.606248 kubelet[1454]: E0515 09:23:51.606121 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:23:52.608641 kubelet[1454]: E0515 09:23:52.607940 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:23:53.612458 kubelet[1454]: E0515 09:23:53.609827 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:23:54.618321 kubelet[1454]: E0515 09:23:54.618073 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:23:55.619450 systemd[1]: Created slice kubepods-besteffort-pod8c5d96a4_aa72_487c_aaac_e258324851f1.slice. May 15 09:23:55.624128 kubelet[1454]: E0515 09:23:55.620965 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:23:55.673371 kubelet[1454]: I0515 09:23:55.673253 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tjqz7\" (UniqueName: \"kubernetes.io/projected/8c5d96a4-aa72-487c-aaac-e258324851f1-kube-api-access-tjqz7\") pod \"nginx-deployment-8587fbcb89-6w2lh\" (UID: \"8c5d96a4-aa72-487c-aaac-e258324851f1\") " pod="default/nginx-deployment-8587fbcb89-6w2lh" May 15 09:23:55.934957 env[1150]: time="2025-05-15T09:23:55.934383173Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-6w2lh,Uid:8c5d96a4-aa72-487c-aaac-e258324851f1,Namespace:default,Attempt:0,}" May 15 09:23:56.142550 env[1150]: time="2025-05-15T09:23:56.142473514Z" level=error msg="Failed to destroy network for sandbox \"4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 09:23:56.144909 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96-shm.mount: Deactivated successfully. May 15 09:23:56.146381 env[1150]: time="2025-05-15T09:23:56.146328112Z" level=error msg="encountered an error cleaning up failed sandbox \"4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 09:23:56.146544 env[1150]: time="2025-05-15T09:23:56.146509292Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-6w2lh,Uid:8c5d96a4-aa72-487c-aaac-e258324851f1,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 09:23:56.148886 kubelet[1454]: E0515 09:23:56.147207 1454 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 09:23:56.148886 kubelet[1454]: E0515 09:23:56.147427 1454 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-6w2lh" May 15 09:23:56.148886 kubelet[1454]: E0515 09:23:56.147504 1454 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-6w2lh" May 15 09:23:56.149186 kubelet[1454]: E0515 09:23:56.147647 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-8587fbcb89-6w2lh_default(8c5d96a4-aa72-487c-aaac-e258324851f1)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-8587fbcb89-6w2lh_default(8c5d96a4-aa72-487c-aaac-e258324851f1)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-6w2lh" podUID="8c5d96a4-aa72-487c-aaac-e258324851f1" May 15 09:23:56.622753 kubelet[1454]: E0515 09:23:56.622419 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:23:56.942534 kubelet[1454]: I0515 09:23:56.940742 1454 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96" May 15 09:23:56.943506 env[1150]: time="2025-05-15T09:23:56.943369937Z" level=info msg="StopPodSandbox for \"4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96\"" May 15 09:23:57.045618 env[1150]: time="2025-05-15T09:23:57.045518576Z" level=error msg="StopPodSandbox for \"4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96\" failed" error="failed to destroy network for sandbox \"4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 09:23:57.046792 kubelet[1454]: E0515 09:23:57.046250 1454 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96" May 15 09:23:57.046792 kubelet[1454]: E0515 09:23:57.046396 1454 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96"} May 15 09:23:57.046792 kubelet[1454]: E0515 09:23:57.046530 1454 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8c5d96a4-aa72-487c-aaac-e258324851f1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 09:23:57.046792 kubelet[1454]: E0515 09:23:57.046690 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8c5d96a4-aa72-487c-aaac-e258324851f1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-6w2lh" podUID="8c5d96a4-aa72-487c-aaac-e258324851f1" May 15 09:23:57.623718 kubelet[1454]: E0515 09:23:57.623633 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:23:58.625566 kubelet[1454]: E0515 09:23:58.625500 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:23:59.626829 kubelet[1454]: E0515 09:23:59.626741 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:00.628014 kubelet[1454]: E0515 09:24:00.627829 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:00.821649 env[1150]: time="2025-05-15T09:24:00.821548075Z" level=info msg="StopPodSandbox for \"3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f\"" May 15 09:24:00.892948 env[1150]: time="2025-05-15T09:24:00.892202150Z" level=error msg="StopPodSandbox for \"3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f\" failed" error="failed to destroy network for sandbox \"3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 09:24:00.894287 kubelet[1454]: E0515 09:24:00.893449 1454 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f" May 15 09:24:00.894287 kubelet[1454]: E0515 09:24:00.893706 1454 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f"} May 15 09:24:00.894287 kubelet[1454]: E0515 09:24:00.893911 1454 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ed417abd-ce43-46d6-b289-3aa9eba2746f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 09:24:00.894287 kubelet[1454]: E0515 09:24:00.894134 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ed417abd-ce43-46d6-b289-3aa9eba2746f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-vstrf" podUID="ed417abd-ce43-46d6-b289-3aa9eba2746f" May 15 09:24:01.431403 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3829548704.mount: Deactivated successfully. May 15 09:24:01.521060 env[1150]: time="2025-05-15T09:24:01.520947341Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:24:01.526085 env[1150]: time="2025-05-15T09:24:01.526001560Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:24:01.535748 env[1150]: time="2025-05-15T09:24:01.535677937Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:24:01.540174 env[1150]: time="2025-05-15T09:24:01.540019259Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae\"" May 15 09:24:01.542893 env[1150]: time="2025-05-15T09:24:01.541967654Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:24:01.587362 env[1150]: time="2025-05-15T09:24:01.587264875Z" level=info msg="CreateContainer within sandbox \"ac1b620d4f4e4b688b0fd1f909907596b0d33aed1caa07388088765150051e34\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 15 09:24:01.625866 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2723748857.mount: Deactivated successfully. May 15 09:24:01.628936 kubelet[1454]: E0515 09:24:01.628859 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:01.633489 env[1150]: time="2025-05-15T09:24:01.633440012Z" level=info msg="CreateContainer within sandbox \"ac1b620d4f4e4b688b0fd1f909907596b0d33aed1caa07388088765150051e34\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"510b7b4b34943d1cd869d43d910bfc933779687617be8470379f6d816c781ba4\"" May 15 09:24:01.634946 env[1150]: time="2025-05-15T09:24:01.634858873Z" level=info msg="StartContainer for \"510b7b4b34943d1cd869d43d910bfc933779687617be8470379f6d816c781ba4\"" May 15 09:24:01.691667 systemd[1]: Started cri-containerd-510b7b4b34943d1cd869d43d910bfc933779687617be8470379f6d816c781ba4.scope. May 15 09:24:01.726000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:01.730894 kernel: kauditd_printk_skb: 34 callbacks suppressed May 15 09:24:01.731142 kernel: audit: type=1400 audit(1747301041.726:528): avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:01.726000 audit[2068]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f6edc093358 items=0 ppid=1552 pid=2068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:01.746081 kernel: audit: type=1300 audit(1747301041.726:528): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f6edc093358 items=0 ppid=1552 pid=2068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:01.746200 kernel: audit: type=1327 audit(1747301041.726:528): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531306237623462333439343364316364383639643433643931306266 May 15 09:24:01.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531306237623462333439343364316364383639643433643931306266 May 15 09:24:01.727000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:01.757742 kernel: audit: type=1400 audit(1747301041.727:529): avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:01.757826 kernel: audit: type=1400 audit(1747301041.727:529): avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:01.727000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:01.727000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:01.727000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:01.773620 kernel: audit: type=1400 audit(1747301041.727:529): avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:01.773683 kernel: audit: type=1400 audit(1747301041.727:529): avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:01.773739 kernel: audit: type=1400 audit(1747301041.727:529): avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:01.727000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:01.778312 kernel: audit: type=1400 audit(1747301041.727:529): avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:01.727000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:01.727000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:01.787665 kernel: audit: type=1400 audit(1747301041.727:529): avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:01.727000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:01.727000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:01.727000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:01.727000 audit: BPF prog-id=75 op=LOAD May 15 09:24:01.727000 audit[2068]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000298218 items=0 ppid=1552 pid=2068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:01.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531306237623462333439343364316364383639643433643931306266 May 15 09:24:01.735000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:01.735000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:01.735000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:01.735000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:01.735000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:01.735000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:01.735000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:01.735000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:01.735000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:01.735000 audit: BPF prog-id=76 op=LOAD May 15 09:24:01.735000 audit[2068]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000298268 items=0 ppid=1552 pid=2068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:01.735000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531306237623462333439343364316364383639643433643931306266 May 15 09:24:01.752000 audit: BPF prog-id=76 op=UNLOAD May 15 09:24:01.752000 audit: BPF prog-id=75 op=UNLOAD May 15 09:24:01.752000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:01.752000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:01.752000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:01.752000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:01.752000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:01.752000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:01.752000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:01.752000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:01.752000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:01.752000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:01.752000 audit: BPF prog-id=77 op=LOAD May 15 09:24:01.752000 audit[2068]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0002982f8 items=0 ppid=1552 pid=2068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:01.752000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531306237623462333439343364316364383639643433643931306266 May 15 09:24:01.813555 env[1150]: time="2025-05-15T09:24:01.813494119Z" level=info msg="StartContainer for \"510b7b4b34943d1cd869d43d910bfc933779687617be8470379f6d816c781ba4\" returns successfully" May 15 09:24:01.899707 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 15 09:24:01.899882 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 15 09:24:02.021670 kubelet[1454]: I0515 09:24:02.021572 1454 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-glzd2" podStartSLOduration=3.3682910870000002 podStartE2EDuration="33.021505327s" podCreationTimestamp="2025-05-15 09:23:29 +0000 UTC" firstStartedPulling="2025-05-15 09:23:31.891352197 +0000 UTC m=+3.144186109" lastFinishedPulling="2025-05-15 09:24:01.544566387 +0000 UTC m=+32.797400349" observedRunningTime="2025-05-15 09:24:02.013398384 +0000 UTC m=+33.266232416" watchObservedRunningTime="2025-05-15 09:24:02.021505327 +0000 UTC m=+33.274339240" May 15 09:24:02.634195 kubelet[1454]: E0515 09:24:02.629471 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:03.509000 audit[2210]: AVC avc: denied { write } for pid=2210 comm="tee" name="fd" dev="proc" ino=19685 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 09:24:03.514000 audit[2206]: AVC avc: denied { write } for pid=2206 comm="tee" name="fd" dev="proc" ino=19224 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 09:24:03.514000 audit[2206]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc9e3aea0e a2=241 a3=1b6 items=1 ppid=2180 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:03.514000 audit: CWD cwd="/etc/service/enabled/confd/log" May 15 09:24:03.514000 audit: PATH item=0 name="/dev/fd/63" inode=19210 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:24:03.514000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 09:24:03.515000 audit[2208]: AVC avc: denied { write } for pid=2208 comm="tee" name="fd" dev="proc" ino=19228 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 09:24:03.515000 audit[2208]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdd3f0e9fe a2=241 a3=1b6 items=1 ppid=2181 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:03.515000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 15 09:24:03.515000 audit: PATH item=0 name="/dev/fd/63" inode=19211 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:24:03.515000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 09:24:03.509000 audit[2210]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff8133ca10 a2=241 a3=1b6 items=1 ppid=2176 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:03.509000 audit: CWD cwd="/etc/service/enabled/cni/log" May 15 09:24:03.509000 audit: PATH item=0 name="/dev/fd/63" inode=19214 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:24:03.509000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 09:24:03.523000 audit[2225]: AVC avc: denied { write } for pid=2225 comm="tee" name="fd" dev="proc" ino=19692 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 09:24:03.523000 audit[2223]: AVC avc: denied { write } for pid=2223 comm="tee" name="fd" dev="proc" ino=19237 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 09:24:03.523000 audit[2223]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe4f873a0e a2=241 a3=1b6 items=1 ppid=2179 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:03.523000 audit[2225]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffddfb4ba0f a2=241 a3=1b6 items=1 ppid=2185 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:03.523000 audit: CWD cwd="/etc/service/enabled/bird/log" May 15 09:24:03.523000 audit: PATH item=0 name="/dev/fd/63" inode=19686 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:24:03.523000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 09:24:03.523000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 15 09:24:03.523000 audit: PATH item=0 name="/dev/fd/63" inode=19219 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:24:03.523000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 09:24:03.529000 audit[2230]: AVC avc: denied { write } for pid=2230 comm="tee" name="fd" dev="proc" ino=19241 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 09:24:03.529000 audit[2230]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe410f89ff a2=241 a3=1b6 items=1 ppid=2189 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:03.529000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 15 09:24:03.529000 audit: PATH item=0 name="/dev/fd/63" inode=19232 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:24:03.531000 audit[2235]: AVC avc: denied { write } for pid=2235 comm="tee" name="fd" dev="proc" ino=19696 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 09:24:03.531000 audit[2235]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe10757a0e a2=241 a3=1b6 items=1 ppid=2186 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:03.531000 audit: CWD cwd="/etc/service/enabled/felix/log" May 15 09:24:03.531000 audit: PATH item=0 name="/dev/fd/63" inode=19689 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:24:03.531000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 09:24:03.529000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 09:24:03.636130 kubelet[1454]: E0515 09:24:03.636024 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:03.758000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.758000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.758000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.758000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.758000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.758000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.758000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.758000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.758000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.758000 audit: BPF prog-id=78 op=LOAD May 15 09:24:03.758000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffef5b29c40 a2=98 a3=3 items=0 ppid=2191 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:03.758000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 09:24:03.761000 audit: BPF prog-id=78 op=UNLOAD May 15 09:24:03.761000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.761000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.761000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.761000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.761000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.761000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.761000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.761000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.761000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.761000 audit: BPF prog-id=79 op=LOAD May 15 09:24:03.761000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffef5b29a20 a2=74 a3=540051 items=0 ppid=2191 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:03.761000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 09:24:03.761000 audit: BPF prog-id=79 op=UNLOAD May 15 09:24:03.761000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.761000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.761000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.761000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.761000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.761000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.761000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.761000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.761000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.761000 audit: BPF prog-id=80 op=LOAD May 15 09:24:03.761000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffef5b29a50 a2=94 a3=2 items=0 ppid=2191 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:03.761000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 09:24:03.762000 audit: BPF prog-id=80 op=UNLOAD May 15 09:24:03.889000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.889000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.889000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.889000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.889000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.889000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.889000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.889000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.889000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.889000 audit: BPF prog-id=81 op=LOAD May 15 09:24:03.889000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffef5b29910 a2=40 a3=1 items=0 ppid=2191 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:03.889000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 09:24:03.890000 audit: BPF prog-id=81 op=UNLOAD May 15 09:24:03.890000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.890000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffef5b299e0 a2=50 a3=7ffef5b29ac0 items=0 ppid=2191 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:03.890000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 09:24:03.900000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.900000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffef5b29920 a2=28 a3=0 items=0 ppid=2191 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:03.900000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 09:24:03.900000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.900000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffef5b29950 a2=28 a3=0 items=0 ppid=2191 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:03.900000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 09:24:03.900000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.900000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffef5b29860 a2=28 a3=0 items=0 ppid=2191 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:03.900000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 09:24:03.900000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.900000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffef5b29970 a2=28 a3=0 items=0 ppid=2191 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:03.900000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 09:24:03.900000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.900000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffef5b29950 a2=28 a3=0 items=0 ppid=2191 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:03.900000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 09:24:03.900000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.900000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffef5b29940 a2=28 a3=0 items=0 ppid=2191 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:03.900000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 09:24:03.900000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.900000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffef5b29970 a2=28 a3=0 items=0 ppid=2191 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:03.900000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 09:24:03.900000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.900000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffef5b29950 a2=28 a3=0 items=0 ppid=2191 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:03.900000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 09:24:03.900000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.900000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffef5b29970 a2=28 a3=0 items=0 ppid=2191 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:03.900000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 09:24:03.900000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.900000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffef5b29940 a2=28 a3=0 items=0 ppid=2191 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:03.900000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 09:24:03.900000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.900000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffef5b299b0 a2=28 a3=0 items=0 ppid=2191 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:03.900000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 09:24:03.900000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.900000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffef5b29760 a2=50 a3=1 items=0 ppid=2191 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:03.900000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 09:24:03.900000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.900000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.900000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.900000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.900000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.900000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.900000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.900000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.900000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.900000 audit: BPF prog-id=82 op=LOAD May 15 09:24:03.900000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffef5b29760 a2=94 a3=5 items=0 ppid=2191 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:03.900000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 09:24:03.901000 audit: BPF prog-id=82 op=UNLOAD May 15 09:24:03.901000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.901000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffef5b29810 a2=50 a3=1 items=0 ppid=2191 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:03.901000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 09:24:03.901000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.901000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffef5b29930 a2=4 a3=38 items=0 ppid=2191 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:03.901000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 09:24:03.901000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.901000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.901000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.901000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.901000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.901000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.901000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.901000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.901000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.901000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.901000 audit[2287]: AVC avc: denied { confidentiality } for pid=2287 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:24:03.901000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffef5b29980 a2=94 a3=6 items=0 ppid=2191 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:03.901000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 09:24:03.901000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.901000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.901000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.901000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.901000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.901000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.901000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.901000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.901000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.901000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.901000 audit[2287]: AVC avc: denied { confidentiality } for pid=2287 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:24:03.901000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffef5b29130 a2=94 a3=83 items=0 ppid=2191 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:03.901000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 09:24:03.901000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.901000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.901000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.901000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.901000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.901000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.901000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.901000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.901000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.901000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.901000 audit[2287]: AVC avc: denied { confidentiality } for pid=2287 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:24:03.901000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffef5b29130 a2=94 a3=83 items=0 ppid=2191 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:03.901000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 09:24:03.909000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.909000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.909000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.909000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.909000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.909000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.909000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.909000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.909000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.909000 audit: BPF prog-id=83 op=LOAD May 15 09:24:03.909000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc109a0c30 a2=98 a3=1999999999999999 items=0 ppid=2191 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:03.909000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 09:24:03.909000 audit: BPF prog-id=83 op=UNLOAD May 15 09:24:03.909000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.909000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.909000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.909000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.909000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.909000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.909000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.909000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.909000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.909000 audit: BPF prog-id=84 op=LOAD May 15 09:24:03.909000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc109a0b10 a2=74 a3=ffff items=0 ppid=2191 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:03.909000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 09:24:03.910000 audit: BPF prog-id=84 op=UNLOAD May 15 09:24:03.910000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.910000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.910000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.910000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.910000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.910000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.910000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.910000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.910000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:03.910000 audit: BPF prog-id=85 op=LOAD May 15 09:24:03.910000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc109a0b50 a2=40 a3=7ffc109a0d30 items=0 ppid=2191 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:03.910000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 09:24:03.910000 audit: BPF prog-id=85 op=UNLOAD May 15 09:24:04.013553 systemd-networkd[986]: vxlan.calico: Link UP May 15 09:24:04.013560 systemd-networkd[986]: vxlan.calico: Gained carrier May 15 09:24:04.045000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.045000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.045000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.045000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.045000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.045000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.045000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.045000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.045000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.045000 audit: BPF prog-id=86 op=LOAD May 15 09:24:04.045000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff8e076490 a2=98 a3=ffff items=0 ppid=2191 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:04.045000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 09:24:04.046000 audit: BPF prog-id=86 op=UNLOAD May 15 09:24:04.046000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.046000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.046000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.046000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.046000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.046000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.046000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.046000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.046000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.046000 audit: BPF prog-id=87 op=LOAD May 15 09:24:04.046000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff8e0762a0 a2=74 a3=540051 items=0 ppid=2191 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:04.046000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 09:24:04.046000 audit: BPF prog-id=87 op=UNLOAD May 15 09:24:04.046000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.046000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.046000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.046000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.046000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.046000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.046000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.046000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.046000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.046000 audit: BPF prog-id=88 op=LOAD May 15 09:24:04.046000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff8e0762d0 a2=94 a3=2 items=0 ppid=2191 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:04.046000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 09:24:04.046000 audit: BPF prog-id=88 op=UNLOAD May 15 09:24:04.046000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.046000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff8e0761a0 a2=28 a3=0 items=0 ppid=2191 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:04.046000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 09:24:04.046000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.046000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff8e0761d0 a2=28 a3=0 items=0 ppid=2191 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:04.046000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 09:24:04.046000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.046000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff8e0760e0 a2=28 a3=0 items=0 ppid=2191 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:04.046000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 09:24:04.046000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.046000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff8e0761f0 a2=28 a3=0 items=0 ppid=2191 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:04.046000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 09:24:04.046000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.046000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff8e0761d0 a2=28 a3=0 items=0 ppid=2191 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:04.046000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 09:24:04.046000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.046000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff8e0761c0 a2=28 a3=0 items=0 ppid=2191 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:04.046000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 09:24:04.046000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.046000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff8e0761f0 a2=28 a3=0 items=0 ppid=2191 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:04.046000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 09:24:04.046000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.046000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff8e0761d0 a2=28 a3=0 items=0 ppid=2191 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:04.046000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 09:24:04.046000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.046000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff8e0761f0 a2=28 a3=0 items=0 ppid=2191 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:04.046000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 09:24:04.046000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.046000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff8e0761c0 a2=28 a3=0 items=0 ppid=2191 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:04.046000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 09:24:04.046000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.046000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff8e076230 a2=28 a3=0 items=0 ppid=2191 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:04.046000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 09:24:04.046000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.046000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.046000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.046000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.046000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.046000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.046000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.046000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.046000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.046000 audit: BPF prog-id=89 op=LOAD May 15 09:24:04.046000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff8e0760a0 a2=40 a3=0 items=0 ppid=2191 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:04.046000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 09:24:04.046000 audit: BPF prog-id=89 op=UNLOAD May 15 09:24:04.047000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.047000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fff8e076090 a2=50 a3=2800 items=0 ppid=2191 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:04.047000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 09:24:04.047000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.047000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fff8e076090 a2=50 a3=2800 items=0 ppid=2191 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:04.047000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 09:24:04.047000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.047000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.047000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.047000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.047000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.047000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.047000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.047000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.047000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.047000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.047000 audit: BPF prog-id=90 op=LOAD May 15 09:24:04.047000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff8e0758b0 a2=94 a3=2 items=0 ppid=2191 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:04.047000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 09:24:04.050000 audit: BPF prog-id=90 op=UNLOAD May 15 09:24:04.050000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.050000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.050000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.050000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.050000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.050000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.050000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.050000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.050000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.050000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.050000 audit: BPF prog-id=91 op=LOAD May 15 09:24:04.050000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff8e0759b0 a2=94 a3=30 items=0 ppid=2191 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:04.050000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 09:24:04.055000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.055000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.055000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.055000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.055000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.055000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.055000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.055000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.055000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.055000 audit: BPF prog-id=92 op=LOAD May 15 09:24:04.055000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcb155b7f0 a2=98 a3=0 items=0 ppid=2191 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:04.055000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 09:24:04.056000 audit: BPF prog-id=92 op=UNLOAD May 15 09:24:04.056000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.056000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.056000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.056000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.056000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.056000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.056000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.056000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.056000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.056000 audit: BPF prog-id=93 op=LOAD May 15 09:24:04.056000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcb155b5d0 a2=74 a3=540051 items=0 ppid=2191 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:04.056000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 09:24:04.056000 audit: BPF prog-id=93 op=UNLOAD May 15 09:24:04.056000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.056000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.056000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.056000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.056000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.056000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.056000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.056000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.056000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.056000 audit: BPF prog-id=94 op=LOAD May 15 09:24:04.056000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcb155b600 a2=94 a3=2 items=0 ppid=2191 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:04.056000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 09:24:04.056000 audit: BPF prog-id=94 op=UNLOAD May 15 09:24:04.202000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.202000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.202000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.202000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.202000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.202000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.202000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.202000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.202000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.202000 audit: BPF prog-id=95 op=LOAD May 15 09:24:04.202000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcb155b4c0 a2=40 a3=1 items=0 ppid=2191 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:04.202000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 09:24:04.204000 audit: BPF prog-id=95 op=UNLOAD May 15 09:24:04.204000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.204000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffcb155b590 a2=50 a3=7ffcb155b670 items=0 ppid=2191 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:04.204000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 09:24:04.214000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.214000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcb155b4d0 a2=28 a3=0 items=0 ppid=2191 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:04.214000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 09:24:04.214000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.214000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcb155b500 a2=28 a3=0 items=0 ppid=2191 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:04.214000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 09:24:04.214000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.214000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcb155b410 a2=28 a3=0 items=0 ppid=2191 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:04.214000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 09:24:04.214000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.214000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcb155b520 a2=28 a3=0 items=0 ppid=2191 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:04.214000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 09:24:04.214000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.214000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcb155b500 a2=28 a3=0 items=0 ppid=2191 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:04.214000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 09:24:04.214000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.214000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcb155b4f0 a2=28 a3=0 items=0 ppid=2191 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:04.214000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 09:24:04.214000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.214000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcb155b520 a2=28 a3=0 items=0 ppid=2191 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:04.214000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 09:24:04.214000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.214000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcb155b500 a2=28 a3=0 items=0 ppid=2191 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:04.214000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 09:24:04.215000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.215000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcb155b520 a2=28 a3=0 items=0 ppid=2191 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:04.215000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 09:24:04.215000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.215000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcb155b4f0 a2=28 a3=0 items=0 ppid=2191 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:04.215000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 09:24:04.215000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.215000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcb155b560 a2=28 a3=0 items=0 ppid=2191 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:04.215000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 09:24:04.216000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.216000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcb155b310 a2=50 a3=1 items=0 ppid=2191 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:04.216000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 09:24:04.216000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.216000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.216000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.216000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.216000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.216000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.216000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.216000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.216000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.216000 audit: BPF prog-id=96 op=LOAD May 15 09:24:04.216000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcb155b310 a2=94 a3=5 items=0 ppid=2191 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:04.216000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 09:24:04.216000 audit: BPF prog-id=96 op=UNLOAD May 15 09:24:04.216000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.216000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcb155b3c0 a2=50 a3=1 items=0 ppid=2191 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:04.216000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 09:24:04.217000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.217000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffcb155b4e0 a2=4 a3=38 items=0 ppid=2191 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:04.217000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 09:24:04.217000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.217000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.217000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.217000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.217000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.217000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.217000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.217000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.217000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.217000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.217000 audit[2323]: AVC avc: denied { confidentiality } for pid=2323 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:24:04.217000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcb155b530 a2=94 a3=6 items=0 ppid=2191 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:04.217000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 09:24:04.218000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.218000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.218000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.218000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.218000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.218000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.218000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.218000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.218000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.218000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.218000 audit[2323]: AVC avc: denied { confidentiality } for pid=2323 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:24:04.218000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcb155ace0 a2=94 a3=83 items=0 ppid=2191 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:04.218000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 09:24:04.218000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.218000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.218000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.218000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.218000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.218000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.218000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.218000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.218000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.218000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.218000 audit[2323]: AVC avc: denied { confidentiality } for pid=2323 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:24:04.218000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcb155ace0 a2=94 a3=83 items=0 ppid=2191 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:04.218000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 09:24:04.219000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.219000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcb155c720 a2=10 a3=f0f1 items=0 ppid=2191 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:04.219000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 09:24:04.220000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.220000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcb155c5c0 a2=10 a3=3 items=0 ppid=2191 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:04.220000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 09:24:04.220000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.220000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcb155c560 a2=10 a3=3 items=0 ppid=2191 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:04.220000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 09:24:04.220000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:04.220000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcb155c560 a2=10 a3=7 items=0 ppid=2191 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:04.220000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 09:24:04.230000 audit: BPF prog-id=91 op=UNLOAD May 15 09:24:04.366000 audit[2348]: NETFILTER_CFG table=mangle:65 family=2 entries=16 op=nft_register_chain pid=2348 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 09:24:04.366000 audit[2348]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffe4f3b0330 a2=0 a3=7ffe4f3b031c items=0 ppid=2191 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:04.366000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 09:24:04.408000 audit[2346]: NETFILTER_CFG table=nat:66 family=2 entries=15 op=nft_register_chain pid=2346 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 09:24:04.408000 audit[2346]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffd38b16bc0 a2=0 a3=7ffd38b16bac items=0 ppid=2191 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:04.408000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 09:24:04.447000 audit[2347]: NETFILTER_CFG table=filter:67 family=2 entries=39 op=nft_register_chain pid=2347 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 09:24:04.447000 audit[2347]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffe13342a30 a2=0 a3=7ffe13342a1c items=0 ppid=2191 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:04.447000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 09:24:04.472000 audit[2345]: NETFILTER_CFG table=raw:68 family=2 entries=21 op=nft_register_chain pid=2345 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 09:24:04.472000 audit[2345]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffcf19c3f00 a2=0 a3=7ffcf19c3eec items=0 ppid=2191 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:04.472000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 09:24:04.636996 kubelet[1454]: E0515 09:24:04.636701 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:05.141632 systemd-networkd[986]: vxlan.calico: Gained IPv6LL May 15 09:24:05.637951 kubelet[1454]: E0515 09:24:05.637860 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:06.640049 kubelet[1454]: E0515 09:24:06.639911 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:07.640855 kubelet[1454]: E0515 09:24:07.640739 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:08.641728 kubelet[1454]: E0515 09:24:08.641652 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:09.585337 kubelet[1454]: E0515 09:24:09.585243 1454 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:09.643822 kubelet[1454]: E0515 09:24:09.643680 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:09.818055 env[1150]: time="2025-05-15T09:24:09.817818310Z" level=info msg="StopPodSandbox for \"4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96\"" May 15 09:24:10.049979 env[1150]: 2025-05-15 09:24:09.951 [INFO][2384] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96" May 15 09:24:10.049979 env[1150]: 2025-05-15 09:24:09.952 [INFO][2384] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96" iface="eth0" netns="/var/run/netns/cni-c2677c89-75a6-77d4-e5e5-6537459516db" May 15 09:24:10.049979 env[1150]: 2025-05-15 09:24:09.952 [INFO][2384] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96" iface="eth0" netns="/var/run/netns/cni-c2677c89-75a6-77d4-e5e5-6537459516db" May 15 09:24:10.049979 env[1150]: 2025-05-15 09:24:09.952 [INFO][2384] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96" iface="eth0" netns="/var/run/netns/cni-c2677c89-75a6-77d4-e5e5-6537459516db" May 15 09:24:10.049979 env[1150]: 2025-05-15 09:24:09.953 [INFO][2384] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96" May 15 09:24:10.049979 env[1150]: 2025-05-15 09:24:09.953 [INFO][2384] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96" May 15 09:24:10.049979 env[1150]: 2025-05-15 09:24:10.028 [INFO][2392] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96" HandleID="k8s-pod-network.4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96" Workload="172.24.4.111-k8s-nginx--deployment--8587fbcb89--6w2lh-eth0" May 15 09:24:10.049979 env[1150]: 2025-05-15 09:24:10.028 [INFO][2392] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 09:24:10.049979 env[1150]: 2025-05-15 09:24:10.028 [INFO][2392] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 09:24:10.049979 env[1150]: 2025-05-15 09:24:10.040 [WARNING][2392] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96" HandleID="k8s-pod-network.4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96" Workload="172.24.4.111-k8s-nginx--deployment--8587fbcb89--6w2lh-eth0" May 15 09:24:10.049979 env[1150]: 2025-05-15 09:24:10.040 [INFO][2392] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96" HandleID="k8s-pod-network.4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96" Workload="172.24.4.111-k8s-nginx--deployment--8587fbcb89--6w2lh-eth0" May 15 09:24:10.049979 env[1150]: 2025-05-15 09:24:10.043 [INFO][2392] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 09:24:10.049979 env[1150]: 2025-05-15 09:24:10.047 [INFO][2384] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96" May 15 09:24:10.050927 env[1150]: time="2025-05-15T09:24:10.050884195Z" level=info msg="TearDown network for sandbox \"4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96\" successfully" May 15 09:24:10.051019 env[1150]: time="2025-05-15T09:24:10.050998600Z" level=info msg="StopPodSandbox for \"4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96\" returns successfully" May 15 09:24:10.053246 systemd[1]: run-netns-cni\x2dc2677c89\x2d75a6\x2d77d4\x2de5e5\x2d6537459516db.mount: Deactivated successfully. May 15 09:24:10.055253 env[1150]: time="2025-05-15T09:24:10.055216541Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-6w2lh,Uid:8c5d96a4-aa72-487c-aaac-e258324851f1,Namespace:default,Attempt:1,}" May 15 09:24:10.334394 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 09:24:10.336600 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali704ce9a1b89: link becomes ready May 15 09:24:10.334574 systemd-networkd[986]: cali704ce9a1b89: Link UP May 15 09:24:10.335469 systemd-networkd[986]: cali704ce9a1b89: Gained carrier May 15 09:24:10.378500 env[1150]: 2025-05-15 09:24:10.159 [INFO][2398] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.111-k8s-nginx--deployment--8587fbcb89--6w2lh-eth0 nginx-deployment-8587fbcb89- default 8c5d96a4-aa72-487c-aaac-e258324851f1 1385 0 2025-05-15 09:23:55 +0000 UTC map[app:nginx pod-template-hash:8587fbcb89 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.24.4.111 nginx-deployment-8587fbcb89-6w2lh eth0 default [] [] [kns.default ksa.default.default] cali704ce9a1b89 [] []}} ContainerID="10a68ff4d2628e2037e28721ca1bb5d4d6db8ca16278cafe01e175851ea2a213" Namespace="default" Pod="nginx-deployment-8587fbcb89-6w2lh" WorkloadEndpoint="172.24.4.111-k8s-nginx--deployment--8587fbcb89--6w2lh-" May 15 09:24:10.378500 env[1150]: 2025-05-15 09:24:10.159 [INFO][2398] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="10a68ff4d2628e2037e28721ca1bb5d4d6db8ca16278cafe01e175851ea2a213" Namespace="default" Pod="nginx-deployment-8587fbcb89-6w2lh" WorkloadEndpoint="172.24.4.111-k8s-nginx--deployment--8587fbcb89--6w2lh-eth0" May 15 09:24:10.378500 env[1150]: 2025-05-15 09:24:10.214 [INFO][2411] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="10a68ff4d2628e2037e28721ca1bb5d4d6db8ca16278cafe01e175851ea2a213" HandleID="k8s-pod-network.10a68ff4d2628e2037e28721ca1bb5d4d6db8ca16278cafe01e175851ea2a213" Workload="172.24.4.111-k8s-nginx--deployment--8587fbcb89--6w2lh-eth0" May 15 09:24:10.378500 env[1150]: 2025-05-15 09:24:10.243 [INFO][2411] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="10a68ff4d2628e2037e28721ca1bb5d4d6db8ca16278cafe01e175851ea2a213" HandleID="k8s-pod-network.10a68ff4d2628e2037e28721ca1bb5d4d6db8ca16278cafe01e175851ea2a213" Workload="172.24.4.111-k8s-nginx--deployment--8587fbcb89--6w2lh-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031d930), Attrs:map[string]string{"namespace":"default", "node":"172.24.4.111", "pod":"nginx-deployment-8587fbcb89-6w2lh", "timestamp":"2025-05-15 09:24:10.21475108 +0000 UTC"}, Hostname:"172.24.4.111", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 09:24:10.378500 env[1150]: 2025-05-15 09:24:10.243 [INFO][2411] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 09:24:10.378500 env[1150]: 2025-05-15 09:24:10.243 [INFO][2411] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 09:24:10.378500 env[1150]: 2025-05-15 09:24:10.244 [INFO][2411] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.111' May 15 09:24:10.378500 env[1150]: 2025-05-15 09:24:10.250 [INFO][2411] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.10a68ff4d2628e2037e28721ca1bb5d4d6db8ca16278cafe01e175851ea2a213" host="172.24.4.111" May 15 09:24:10.378500 env[1150]: 2025-05-15 09:24:10.260 [INFO][2411] ipam/ipam.go 372: Looking up existing affinities for host host="172.24.4.111" May 15 09:24:10.378500 env[1150]: 2025-05-15 09:24:10.272 [INFO][2411] ipam/ipam.go 489: Trying affinity for 192.168.20.192/26 host="172.24.4.111" May 15 09:24:10.378500 env[1150]: 2025-05-15 09:24:10.277 [INFO][2411] ipam/ipam.go 155: Attempting to load block cidr=192.168.20.192/26 host="172.24.4.111" May 15 09:24:10.378500 env[1150]: 2025-05-15 09:24:10.284 [INFO][2411] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.20.192/26 host="172.24.4.111" May 15 09:24:10.378500 env[1150]: 2025-05-15 09:24:10.284 [INFO][2411] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.20.192/26 handle="k8s-pod-network.10a68ff4d2628e2037e28721ca1bb5d4d6db8ca16278cafe01e175851ea2a213" host="172.24.4.111" May 15 09:24:10.378500 env[1150]: 2025-05-15 09:24:10.290 [INFO][2411] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.10a68ff4d2628e2037e28721ca1bb5d4d6db8ca16278cafe01e175851ea2a213 May 15 09:24:10.378500 env[1150]: 2025-05-15 09:24:10.305 [INFO][2411] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.20.192/26 handle="k8s-pod-network.10a68ff4d2628e2037e28721ca1bb5d4d6db8ca16278cafe01e175851ea2a213" host="172.24.4.111" May 15 09:24:10.378500 env[1150]: 2025-05-15 09:24:10.315 [INFO][2411] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.20.193/26] block=192.168.20.192/26 handle="k8s-pod-network.10a68ff4d2628e2037e28721ca1bb5d4d6db8ca16278cafe01e175851ea2a213" host="172.24.4.111" May 15 09:24:10.378500 env[1150]: 2025-05-15 09:24:10.315 [INFO][2411] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.20.193/26] handle="k8s-pod-network.10a68ff4d2628e2037e28721ca1bb5d4d6db8ca16278cafe01e175851ea2a213" host="172.24.4.111" May 15 09:24:10.378500 env[1150]: 2025-05-15 09:24:10.315 [INFO][2411] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 09:24:10.378500 env[1150]: 2025-05-15 09:24:10.315 [INFO][2411] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.20.193/26] IPv6=[] ContainerID="10a68ff4d2628e2037e28721ca1bb5d4d6db8ca16278cafe01e175851ea2a213" HandleID="k8s-pod-network.10a68ff4d2628e2037e28721ca1bb5d4d6db8ca16278cafe01e175851ea2a213" Workload="172.24.4.111-k8s-nginx--deployment--8587fbcb89--6w2lh-eth0" May 15 09:24:10.380977 env[1150]: 2025-05-15 09:24:10.321 [INFO][2398] cni-plugin/k8s.go 386: Populated endpoint ContainerID="10a68ff4d2628e2037e28721ca1bb5d4d6db8ca16278cafe01e175851ea2a213" Namespace="default" Pod="nginx-deployment-8587fbcb89-6w2lh" WorkloadEndpoint="172.24.4.111-k8s-nginx--deployment--8587fbcb89--6w2lh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.111-k8s-nginx--deployment--8587fbcb89--6w2lh-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"8c5d96a4-aa72-487c-aaac-e258324851f1", ResourceVersion:"1385", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 9, 23, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.111", ContainerID:"", Pod:"nginx-deployment-8587fbcb89-6w2lh", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.20.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali704ce9a1b89", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 09:24:10.380977 env[1150]: 2025-05-15 09:24:10.321 [INFO][2398] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.20.193/32] ContainerID="10a68ff4d2628e2037e28721ca1bb5d4d6db8ca16278cafe01e175851ea2a213" Namespace="default" Pod="nginx-deployment-8587fbcb89-6w2lh" WorkloadEndpoint="172.24.4.111-k8s-nginx--deployment--8587fbcb89--6w2lh-eth0" May 15 09:24:10.380977 env[1150]: 2025-05-15 09:24:10.321 [INFO][2398] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali704ce9a1b89 ContainerID="10a68ff4d2628e2037e28721ca1bb5d4d6db8ca16278cafe01e175851ea2a213" Namespace="default" Pod="nginx-deployment-8587fbcb89-6w2lh" WorkloadEndpoint="172.24.4.111-k8s-nginx--deployment--8587fbcb89--6w2lh-eth0" May 15 09:24:10.380977 env[1150]: 2025-05-15 09:24:10.340 [INFO][2398] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="10a68ff4d2628e2037e28721ca1bb5d4d6db8ca16278cafe01e175851ea2a213" Namespace="default" Pod="nginx-deployment-8587fbcb89-6w2lh" WorkloadEndpoint="172.24.4.111-k8s-nginx--deployment--8587fbcb89--6w2lh-eth0" May 15 09:24:10.380977 env[1150]: 2025-05-15 09:24:10.347 [INFO][2398] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="10a68ff4d2628e2037e28721ca1bb5d4d6db8ca16278cafe01e175851ea2a213" Namespace="default" Pod="nginx-deployment-8587fbcb89-6w2lh" WorkloadEndpoint="172.24.4.111-k8s-nginx--deployment--8587fbcb89--6w2lh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.111-k8s-nginx--deployment--8587fbcb89--6w2lh-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"8c5d96a4-aa72-487c-aaac-e258324851f1", ResourceVersion:"1385", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 9, 23, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.111", ContainerID:"10a68ff4d2628e2037e28721ca1bb5d4d6db8ca16278cafe01e175851ea2a213", Pod:"nginx-deployment-8587fbcb89-6w2lh", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.20.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali704ce9a1b89", MAC:"f2:9c:a7:67:87:0b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 09:24:10.380977 env[1150]: 2025-05-15 09:24:10.361 [INFO][2398] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="10a68ff4d2628e2037e28721ca1bb5d4d6db8ca16278cafe01e175851ea2a213" Namespace="default" Pod="nginx-deployment-8587fbcb89-6w2lh" WorkloadEndpoint="172.24.4.111-k8s-nginx--deployment--8587fbcb89--6w2lh-eth0" May 15 09:24:10.409320 kernel: kauditd_printk_skb: 548 callbacks suppressed May 15 09:24:10.409484 kernel: audit: type=1325 audit(1747301050.397:636): table=filter:69 family=2 entries=34 op=nft_register_chain pid=2429 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 09:24:10.397000 audit[2429]: NETFILTER_CFG table=filter:69 family=2 entries=34 op=nft_register_chain pid=2429 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 09:24:10.397000 audit[2429]: SYSCALL arch=c000003e syscall=46 success=yes exit=19124 a0=3 a1=7ffe78cac110 a2=0 a3=7ffe78cac0fc items=0 ppid=2191 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:10.397000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 09:24:10.424887 kernel: audit: type=1300 audit(1747301050.397:636): arch=c000003e syscall=46 success=yes exit=19124 a0=3 a1=7ffe78cac110 a2=0 a3=7ffe78cac0fc items=0 ppid=2191 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:10.424998 kernel: audit: type=1327 audit(1747301050.397:636): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 09:24:10.435527 env[1150]: time="2025-05-15T09:24:10.435395199Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 09:24:10.435730 env[1150]: time="2025-05-15T09:24:10.435540291Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 09:24:10.435730 env[1150]: time="2025-05-15T09:24:10.435575737Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 09:24:10.435965 env[1150]: time="2025-05-15T09:24:10.435913781Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/10a68ff4d2628e2037e28721ca1bb5d4d6db8ca16278cafe01e175851ea2a213 pid=2442 runtime=io.containerd.runc.v2 May 15 09:24:10.454981 systemd[1]: Started cri-containerd-10a68ff4d2628e2037e28721ca1bb5d4d6db8ca16278cafe01e175851ea2a213.scope. May 15 09:24:10.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:10.488772 kernel: audit: type=1400 audit(1747301050.477:637): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:10.488830 kernel: audit: type=1400 audit(1747301050.477:638): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:10.488858 kernel: audit: type=1400 audit(1747301050.477:639): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:10.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:10.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:10.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:10.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:10.502761 kernel: audit: type=1400 audit(1747301050.477:640): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:10.502818 kernel: audit: type=1400 audit(1747301050.477:641): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:10.502847 kernel: audit: type=1400 audit(1747301050.477:642): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:10.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:10.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:10.512156 kernel: audit: type=1400 audit(1747301050.477:643): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:10.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:10.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:10.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:10.491000 audit: BPF prog-id=97 op=LOAD May 15 09:24:10.492000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:10.492000 audit[2453]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2442 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:10.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130613638666634643236323865323033376532383732316361316262 May 15 09:24:10.492000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:10.492000 audit[2453]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2442 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:10.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130613638666634643236323865323033376532383732316361316262 May 15 09:24:10.492000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:10.492000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:10.492000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:10.492000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:10.492000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:10.492000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:10.492000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:10.492000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:10.492000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:10.492000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:10.492000 audit: BPF prog-id=98 op=LOAD May 15 09:24:10.492000 audit[2453]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000f7f60 items=0 ppid=2442 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:10.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130613638666634643236323865323033376532383732316361316262 May 15 09:24:10.496000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:10.496000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:10.496000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:10.496000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:10.496000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:10.496000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:10.496000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:10.496000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:10.496000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:10.496000 audit: BPF prog-id=99 op=LOAD May 15 09:24:10.496000 audit[2453]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000f7fa8 items=0 ppid=2442 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:10.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130613638666634643236323865323033376532383732316361316262 May 15 09:24:10.506000 audit: BPF prog-id=99 op=UNLOAD May 15 09:24:10.506000 audit: BPF prog-id=98 op=UNLOAD May 15 09:24:10.506000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:10.506000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:10.506000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:10.506000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:10.506000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:10.506000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:10.506000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:10.506000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:10.506000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:10.506000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:10.506000 audit: BPF prog-id=100 op=LOAD May 15 09:24:10.506000 audit[2453]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003ee3b8 items=0 ppid=2442 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:10.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130613638666634643236323865323033376532383732316361316262 May 15 09:24:10.542850 env[1150]: time="2025-05-15T09:24:10.542792738Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-6w2lh,Uid:8c5d96a4-aa72-487c-aaac-e258324851f1,Namespace:default,Attempt:1,} returns sandbox id \"10a68ff4d2628e2037e28721ca1bb5d4d6db8ca16278cafe01e175851ea2a213\"" May 15 09:24:10.545904 env[1150]: time="2025-05-15T09:24:10.545881932Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 15 09:24:10.662479 kubelet[1454]: E0515 09:24:10.654627 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:11.058448 systemd[1]: run-containerd-runc-k8s.io-10a68ff4d2628e2037e28721ca1bb5d4d6db8ca16278cafe01e175851ea2a213-runc.IVhBSn.mount: Deactivated successfully. May 15 09:24:11.544947 systemd-networkd[986]: cali704ce9a1b89: Gained IPv6LL May 15 09:24:11.656486 kubelet[1454]: E0515 09:24:11.656333 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:12.657601 kubelet[1454]: E0515 09:24:12.657519 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:13.658648 kubelet[1454]: E0515 09:24:13.658448 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:14.659791 kubelet[1454]: E0515 09:24:14.659610 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:14.816437 env[1150]: time="2025-05-15T09:24:14.816325101Z" level=info msg="StopPodSandbox for \"3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f\"" May 15 09:24:15.133893 env[1150]: 2025-05-15 09:24:14.947 [INFO][2499] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f" May 15 09:24:15.133893 env[1150]: 2025-05-15 09:24:14.947 [INFO][2499] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f" iface="eth0" netns="/var/run/netns/cni-a54f752c-c91c-8082-bca7-9dcd3910f0ab" May 15 09:24:15.133893 env[1150]: 2025-05-15 09:24:14.948 [INFO][2499] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f" iface="eth0" netns="/var/run/netns/cni-a54f752c-c91c-8082-bca7-9dcd3910f0ab" May 15 09:24:15.133893 env[1150]: 2025-05-15 09:24:14.948 [INFO][2499] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f" iface="eth0" netns="/var/run/netns/cni-a54f752c-c91c-8082-bca7-9dcd3910f0ab" May 15 09:24:15.133893 env[1150]: 2025-05-15 09:24:14.948 [INFO][2499] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f" May 15 09:24:15.133893 env[1150]: 2025-05-15 09:24:14.948 [INFO][2499] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f" May 15 09:24:15.133893 env[1150]: 2025-05-15 09:24:14.989 [INFO][2506] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f" HandleID="k8s-pod-network.3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f" Workload="172.24.4.111-k8s-csi--node--driver--vstrf-eth0" May 15 09:24:15.133893 env[1150]: 2025-05-15 09:24:14.989 [INFO][2506] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 09:24:15.133893 env[1150]: 2025-05-15 09:24:14.990 [INFO][2506] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 09:24:15.133893 env[1150]: 2025-05-15 09:24:15.123 [WARNING][2506] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f" HandleID="k8s-pod-network.3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f" Workload="172.24.4.111-k8s-csi--node--driver--vstrf-eth0" May 15 09:24:15.133893 env[1150]: 2025-05-15 09:24:15.123 [INFO][2506] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f" HandleID="k8s-pod-network.3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f" Workload="172.24.4.111-k8s-csi--node--driver--vstrf-eth0" May 15 09:24:15.133893 env[1150]: 2025-05-15 09:24:15.128 [INFO][2506] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 09:24:15.133893 env[1150]: 2025-05-15 09:24:15.131 [INFO][2499] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f" May 15 09:24:15.146947 systemd[1]: run-netns-cni\x2da54f752c\x2dc91c\x2d8082\x2dbca7\x2d9dcd3910f0ab.mount: Deactivated successfully. May 15 09:24:15.153786 env[1150]: time="2025-05-15T09:24:15.153656405Z" level=info msg="TearDown network for sandbox \"3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f\" successfully" May 15 09:24:15.154167 env[1150]: time="2025-05-15T09:24:15.154053770Z" level=info msg="StopPodSandbox for \"3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f\" returns successfully" May 15 09:24:15.157702 env[1150]: time="2025-05-15T09:24:15.157606953Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-vstrf,Uid:ed417abd-ce43-46d6-b289-3aa9eba2746f,Namespace:calico-system,Attempt:1,}" May 15 09:24:15.249574 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount734268601.mount: Deactivated successfully. May 15 09:24:15.661627 kubelet[1454]: E0515 09:24:15.661400 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:15.732667 systemd-networkd[986]: cali184e6486efc: Link UP May 15 09:24:15.744429 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 09:24:15.744584 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali184e6486efc: link becomes ready May 15 09:24:15.745966 systemd-networkd[986]: cali184e6486efc: Gained carrier May 15 09:24:15.779513 env[1150]: 2025-05-15 09:24:15.526 [INFO][2514] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.111-k8s-csi--node--driver--vstrf-eth0 csi-node-driver- calico-system ed417abd-ce43-46d6-b289-3aa9eba2746f 1401 0 2025-05-15 09:23:29 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:5bcd8f69 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 172.24.4.111 csi-node-driver-vstrf eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali184e6486efc [] []}} ContainerID="dcc52de5cdfb68618ac329569aeced1c7fe6404c3855037053621ec831fff0ac" Namespace="calico-system" Pod="csi-node-driver-vstrf" WorkloadEndpoint="172.24.4.111-k8s-csi--node--driver--vstrf-" May 15 09:24:15.779513 env[1150]: 2025-05-15 09:24:15.526 [INFO][2514] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="dcc52de5cdfb68618ac329569aeced1c7fe6404c3855037053621ec831fff0ac" Namespace="calico-system" Pod="csi-node-driver-vstrf" WorkloadEndpoint="172.24.4.111-k8s-csi--node--driver--vstrf-eth0" May 15 09:24:15.779513 env[1150]: 2025-05-15 09:24:15.573 [INFO][2527] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="dcc52de5cdfb68618ac329569aeced1c7fe6404c3855037053621ec831fff0ac" HandleID="k8s-pod-network.dcc52de5cdfb68618ac329569aeced1c7fe6404c3855037053621ec831fff0ac" Workload="172.24.4.111-k8s-csi--node--driver--vstrf-eth0" May 15 09:24:15.779513 env[1150]: 2025-05-15 09:24:15.596 [INFO][2527] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="dcc52de5cdfb68618ac329569aeced1c7fe6404c3855037053621ec831fff0ac" HandleID="k8s-pod-network.dcc52de5cdfb68618ac329569aeced1c7fe6404c3855037053621ec831fff0ac" Workload="172.24.4.111-k8s-csi--node--driver--vstrf-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002905d0), Attrs:map[string]string{"namespace":"calico-system", "node":"172.24.4.111", "pod":"csi-node-driver-vstrf", "timestamp":"2025-05-15 09:24:15.573403246 +0000 UTC"}, Hostname:"172.24.4.111", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 09:24:15.779513 env[1150]: 2025-05-15 09:24:15.596 [INFO][2527] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 09:24:15.779513 env[1150]: 2025-05-15 09:24:15.596 [INFO][2527] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 09:24:15.779513 env[1150]: 2025-05-15 09:24:15.596 [INFO][2527] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.111' May 15 09:24:15.779513 env[1150]: 2025-05-15 09:24:15.616 [INFO][2527] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.dcc52de5cdfb68618ac329569aeced1c7fe6404c3855037053621ec831fff0ac" host="172.24.4.111" May 15 09:24:15.779513 env[1150]: 2025-05-15 09:24:15.629 [INFO][2527] ipam/ipam.go 372: Looking up existing affinities for host host="172.24.4.111" May 15 09:24:15.779513 env[1150]: 2025-05-15 09:24:15.641 [INFO][2527] ipam/ipam.go 489: Trying affinity for 192.168.20.192/26 host="172.24.4.111" May 15 09:24:15.779513 env[1150]: 2025-05-15 09:24:15.647 [INFO][2527] ipam/ipam.go 155: Attempting to load block cidr=192.168.20.192/26 host="172.24.4.111" May 15 09:24:15.779513 env[1150]: 2025-05-15 09:24:15.654 [INFO][2527] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.20.192/26 host="172.24.4.111" May 15 09:24:15.779513 env[1150]: 2025-05-15 09:24:15.655 [INFO][2527] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.20.192/26 handle="k8s-pod-network.dcc52de5cdfb68618ac329569aeced1c7fe6404c3855037053621ec831fff0ac" host="172.24.4.111" May 15 09:24:15.779513 env[1150]: 2025-05-15 09:24:15.661 [INFO][2527] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.dcc52de5cdfb68618ac329569aeced1c7fe6404c3855037053621ec831fff0ac May 15 09:24:15.779513 env[1150]: 2025-05-15 09:24:15.676 [INFO][2527] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.20.192/26 handle="k8s-pod-network.dcc52de5cdfb68618ac329569aeced1c7fe6404c3855037053621ec831fff0ac" host="172.24.4.111" May 15 09:24:15.779513 env[1150]: 2025-05-15 09:24:15.691 [INFO][2527] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.20.194/26] block=192.168.20.192/26 handle="k8s-pod-network.dcc52de5cdfb68618ac329569aeced1c7fe6404c3855037053621ec831fff0ac" host="172.24.4.111" May 15 09:24:15.779513 env[1150]: 2025-05-15 09:24:15.691 [INFO][2527] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.20.194/26] handle="k8s-pod-network.dcc52de5cdfb68618ac329569aeced1c7fe6404c3855037053621ec831fff0ac" host="172.24.4.111" May 15 09:24:15.779513 env[1150]: 2025-05-15 09:24:15.692 [INFO][2527] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 09:24:15.779513 env[1150]: 2025-05-15 09:24:15.692 [INFO][2527] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.20.194/26] IPv6=[] ContainerID="dcc52de5cdfb68618ac329569aeced1c7fe6404c3855037053621ec831fff0ac" HandleID="k8s-pod-network.dcc52de5cdfb68618ac329569aeced1c7fe6404c3855037053621ec831fff0ac" Workload="172.24.4.111-k8s-csi--node--driver--vstrf-eth0" May 15 09:24:15.780761 env[1150]: 2025-05-15 09:24:15.695 [INFO][2514] cni-plugin/k8s.go 386: Populated endpoint ContainerID="dcc52de5cdfb68618ac329569aeced1c7fe6404c3855037053621ec831fff0ac" Namespace="calico-system" Pod="csi-node-driver-vstrf" WorkloadEndpoint="172.24.4.111-k8s-csi--node--driver--vstrf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.111-k8s-csi--node--driver--vstrf-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ed417abd-ce43-46d6-b289-3aa9eba2746f", ResourceVersion:"1401", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 9, 23, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.111", ContainerID:"", Pod:"csi-node-driver-vstrf", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.20.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali184e6486efc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 09:24:15.780761 env[1150]: 2025-05-15 09:24:15.695 [INFO][2514] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.20.194/32] ContainerID="dcc52de5cdfb68618ac329569aeced1c7fe6404c3855037053621ec831fff0ac" Namespace="calico-system" Pod="csi-node-driver-vstrf" WorkloadEndpoint="172.24.4.111-k8s-csi--node--driver--vstrf-eth0" May 15 09:24:15.780761 env[1150]: 2025-05-15 09:24:15.696 [INFO][2514] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali184e6486efc ContainerID="dcc52de5cdfb68618ac329569aeced1c7fe6404c3855037053621ec831fff0ac" Namespace="calico-system" Pod="csi-node-driver-vstrf" WorkloadEndpoint="172.24.4.111-k8s-csi--node--driver--vstrf-eth0" May 15 09:24:15.780761 env[1150]: 2025-05-15 09:24:15.751 [INFO][2514] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="dcc52de5cdfb68618ac329569aeced1c7fe6404c3855037053621ec831fff0ac" Namespace="calico-system" Pod="csi-node-driver-vstrf" WorkloadEndpoint="172.24.4.111-k8s-csi--node--driver--vstrf-eth0" May 15 09:24:15.780761 env[1150]: 2025-05-15 09:24:15.754 [INFO][2514] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="dcc52de5cdfb68618ac329569aeced1c7fe6404c3855037053621ec831fff0ac" Namespace="calico-system" Pod="csi-node-driver-vstrf" WorkloadEndpoint="172.24.4.111-k8s-csi--node--driver--vstrf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.111-k8s-csi--node--driver--vstrf-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ed417abd-ce43-46d6-b289-3aa9eba2746f", ResourceVersion:"1401", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 9, 23, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.111", ContainerID:"dcc52de5cdfb68618ac329569aeced1c7fe6404c3855037053621ec831fff0ac", Pod:"csi-node-driver-vstrf", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.20.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali184e6486efc", MAC:"d6:76:d9:21:e8:a4", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 09:24:15.780761 env[1150]: 2025-05-15 09:24:15.778 [INFO][2514] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="dcc52de5cdfb68618ac329569aeced1c7fe6404c3855037053621ec831fff0ac" Namespace="calico-system" Pod="csi-node-driver-vstrf" WorkloadEndpoint="172.24.4.111-k8s-csi--node--driver--vstrf-eth0" May 15 09:24:15.823667 kernel: kauditd_printk_skb: 50 callbacks suppressed May 15 09:24:15.824065 kernel: audit: type=1325 audit(1747301055.808:655): table=filter:70 family=2 entries=38 op=nft_register_chain pid=2547 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 09:24:15.824280 kernel: audit: type=1300 audit(1747301055.808:655): arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffd41c3d7b0 a2=0 a3=7ffd41c3d79c items=0 ppid=2191 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:15.808000 audit[2547]: NETFILTER_CFG table=filter:70 family=2 entries=38 op=nft_register_chain pid=2547 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 09:24:15.808000 audit[2547]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffd41c3d7b0 a2=0 a3=7ffd41c3d79c items=0 ppid=2191 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:15.828206 kernel: audit: type=1327 audit(1747301055.808:655): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 09:24:15.808000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 09:24:15.846326 env[1150]: time="2025-05-15T09:24:15.840920245Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 09:24:15.846326 env[1150]: time="2025-05-15T09:24:15.840990928Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 09:24:15.846326 env[1150]: time="2025-05-15T09:24:15.841004984Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 09:24:15.846326 env[1150]: time="2025-05-15T09:24:15.841227812Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dcc52de5cdfb68618ac329569aeced1c7fe6404c3855037053621ec831fff0ac pid=2557 runtime=io.containerd.runc.v2 May 15 09:24:15.892459 systemd[1]: Started cri-containerd-dcc52de5cdfb68618ac329569aeced1c7fe6404c3855037053621ec831fff0ac.scope. May 15 09:24:15.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:15.931424 kernel: audit: type=1400 audit(1747301055.919:656): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:15.931567 kernel: audit: type=1400 audit(1747301055.919:657): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:15.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:15.936775 kernel: audit: type=1400 audit(1747301055.919:658): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:15.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:15.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:15.942140 kernel: audit: type=1400 audit(1747301055.919:659): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:15.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:15.949126 kernel: audit: type=1400 audit(1747301055.919:660): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:15.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:15.959062 kernel: audit: type=1400 audit(1747301055.919:661): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:15.959134 kernel: audit: type=1400 audit(1747301055.919:662): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:15.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:15.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:15.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:15.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:15.920000 audit: BPF prog-id=101 op=LOAD May 15 09:24:15.920000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:15.920000 audit[2567]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2557 pid=2567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:15.920000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463633532646535636466623638363138616333323935363961656365 May 15 09:24:15.920000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:15.920000 audit[2567]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2557 pid=2567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:15.920000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463633532646535636466623638363138616333323935363961656365 May 15 09:24:15.921000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:15.921000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:15.921000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:15.921000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:15.921000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:15.921000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:15.921000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:15.921000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:15.921000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:15.921000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:15.921000 audit: BPF prog-id=102 op=LOAD May 15 09:24:15.921000 audit[2567]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000024550 items=0 ppid=2557 pid=2567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:15.921000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463633532646535636466623638363138616333323935363961656365 May 15 09:24:15.925000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:15.925000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:15.925000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:15.925000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:15.925000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:15.925000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:15.925000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:15.925000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:15.925000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:15.925000 audit: BPF prog-id=103 op=LOAD May 15 09:24:15.925000 audit[2567]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000024598 items=0 ppid=2557 pid=2567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:15.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463633532646535636466623638363138616333323935363961656365 May 15 09:24:15.925000 audit: BPF prog-id=103 op=UNLOAD May 15 09:24:15.925000 audit: BPF prog-id=102 op=UNLOAD May 15 09:24:15.925000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:15.925000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:15.925000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:15.925000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:15.925000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:15.925000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:15.925000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:15.925000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:15.925000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:15.925000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:15.925000 audit: BPF prog-id=104 op=LOAD May 15 09:24:15.925000 audit[2567]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000249a8 items=0 ppid=2557 pid=2567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:15.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463633532646535636466623638363138616333323935363961656365 May 15 09:24:15.963537 env[1150]: time="2025-05-15T09:24:15.963457159Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-vstrf,Uid:ed417abd-ce43-46d6-b289-3aa9eba2746f,Namespace:calico-system,Attempt:1,} returns sandbox id \"dcc52de5cdfb68618ac329569aeced1c7fe6404c3855037053621ec831fff0ac\"" May 15 09:24:16.663655 kubelet[1454]: E0515 09:24:16.663329 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:17.112881 systemd-networkd[986]: cali184e6486efc: Gained IPv6LL May 15 09:24:17.667052 kubelet[1454]: E0515 09:24:17.666134 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:17.766597 env[1150]: time="2025-05-15T09:24:17.766419131Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:24:17.772909 env[1150]: time="2025-05-15T09:24:17.772819996Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:24:17.779624 env[1150]: time="2025-05-15T09:24:17.779529940Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:24:17.787930 env[1150]: time="2025-05-15T09:24:17.787814397Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa\"" May 15 09:24:17.789156 env[1150]: time="2025-05-15T09:24:17.788891447Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:24:17.797197 env[1150]: time="2025-05-15T09:24:17.797065186Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 15 09:24:17.801606 env[1150]: time="2025-05-15T09:24:17.801465369Z" level=info msg="CreateContainer within sandbox \"10a68ff4d2628e2037e28721ca1bb5d4d6db8ca16278cafe01e175851ea2a213\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" May 15 09:24:17.839113 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3889446416.mount: Deactivated successfully. May 15 09:24:17.854959 env[1150]: time="2025-05-15T09:24:17.854860521Z" level=info msg="CreateContainer within sandbox \"10a68ff4d2628e2037e28721ca1bb5d4d6db8ca16278cafe01e175851ea2a213\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"6594233d6c6350f292fc7ea22bf5828a88f2426814025551ac1d8e971d923ebf\"" May 15 09:24:17.856887 env[1150]: time="2025-05-15T09:24:17.856811188Z" level=info msg="StartContainer for \"6594233d6c6350f292fc7ea22bf5828a88f2426814025551ac1d8e971d923ebf\"" May 15 09:24:17.910515 systemd[1]: Started cri-containerd-6594233d6c6350f292fc7ea22bf5828a88f2426814025551ac1d8e971d923ebf.scope. May 15 09:24:17.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:17.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:17.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:17.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:17.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:17.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:17.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:17.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:17.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:17.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:17.926000 audit: BPF prog-id=105 op=LOAD May 15 09:24:17.927000 audit[2598]: AVC avc: denied { bpf } for pid=2598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:17.927000 audit[2598]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2442 pid=2598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:17.927000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635393432333364366336333530663239326663376561323262663538 May 15 09:24:17.927000 audit[2598]: AVC avc: denied { perfmon } for pid=2598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:17.927000 audit[2598]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2442 pid=2598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:17.927000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635393432333364366336333530663239326663376561323262663538 May 15 09:24:17.927000 audit[2598]: AVC avc: denied { bpf } for pid=2598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:17.927000 audit[2598]: AVC avc: denied { bpf } for pid=2598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:17.927000 audit[2598]: AVC avc: denied { bpf } for pid=2598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:17.927000 audit[2598]: AVC avc: denied { perfmon } for pid=2598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:17.927000 audit[2598]: AVC avc: denied { perfmon } for pid=2598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:17.927000 audit[2598]: AVC avc: denied { perfmon } for pid=2598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:17.927000 audit[2598]: AVC avc: denied { perfmon } for pid=2598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:17.927000 audit[2598]: AVC avc: denied { perfmon } for pid=2598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:17.927000 audit[2598]: AVC avc: denied { bpf } for pid=2598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:17.927000 audit[2598]: AVC avc: denied { bpf } for pid=2598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:17.927000 audit: BPF prog-id=106 op=LOAD May 15 09:24:17.927000 audit[2598]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000253d0 items=0 ppid=2442 pid=2598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:17.927000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635393432333364366336333530663239326663376561323262663538 May 15 09:24:17.927000 audit[2598]: AVC avc: denied { bpf } for pid=2598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:17.927000 audit[2598]: AVC avc: denied { bpf } for pid=2598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:17.927000 audit[2598]: AVC avc: denied { perfmon } for pid=2598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:17.927000 audit[2598]: AVC avc: denied { perfmon } for pid=2598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:17.927000 audit[2598]: AVC avc: denied { perfmon } for pid=2598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:17.927000 audit[2598]: AVC avc: denied { perfmon } for pid=2598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:17.927000 audit[2598]: AVC avc: denied { perfmon } for pid=2598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:17.927000 audit[2598]: AVC avc: denied { bpf } for pid=2598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:17.927000 audit[2598]: AVC avc: denied { bpf } for pid=2598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:17.927000 audit: BPF prog-id=107 op=LOAD May 15 09:24:17.927000 audit[2598]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000025418 items=0 ppid=2442 pid=2598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:17.927000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635393432333364366336333530663239326663376561323262663538 May 15 09:24:17.927000 audit: BPF prog-id=107 op=UNLOAD May 15 09:24:17.927000 audit: BPF prog-id=106 op=UNLOAD May 15 09:24:17.927000 audit[2598]: AVC avc: denied { bpf } for pid=2598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:17.927000 audit[2598]: AVC avc: denied { bpf } for pid=2598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:17.927000 audit[2598]: AVC avc: denied { bpf } for pid=2598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:17.927000 audit[2598]: AVC avc: denied { perfmon } for pid=2598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:17.927000 audit[2598]: AVC avc: denied { perfmon } for pid=2598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:17.927000 audit[2598]: AVC avc: denied { perfmon } for pid=2598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:17.927000 audit[2598]: AVC avc: denied { perfmon } for pid=2598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:17.927000 audit[2598]: AVC avc: denied { perfmon } for pid=2598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:17.927000 audit[2598]: AVC avc: denied { bpf } for pid=2598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:17.927000 audit[2598]: AVC avc: denied { bpf } for pid=2598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:17.927000 audit: BPF prog-id=108 op=LOAD May 15 09:24:17.927000 audit[2598]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000025828 items=0 ppid=2442 pid=2598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:17.927000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635393432333364366336333530663239326663376561323262663538 May 15 09:24:17.954726 env[1150]: time="2025-05-15T09:24:17.954671663Z" level=info msg="StartContainer for \"6594233d6c6350f292fc7ea22bf5828a88f2426814025551ac1d8e971d923ebf\" returns successfully" May 15 09:24:18.667337 kubelet[1454]: E0515 09:24:18.667273 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:18.825384 systemd[1]: run-containerd-runc-k8s.io-6594233d6c6350f292fc7ea22bf5828a88f2426814025551ac1d8e971d923ebf-runc.2FRjgU.mount: Deactivated successfully. May 15 09:24:19.669616 kubelet[1454]: E0515 09:24:19.669535 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:20.671453 kubelet[1454]: E0515 09:24:20.671344 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:20.907338 env[1150]: time="2025-05-15T09:24:20.906403462Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:24:20.910044 env[1150]: time="2025-05-15T09:24:20.909981713Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:24:20.912775 env[1150]: time="2025-05-15T09:24:20.912693799Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:24:20.915276 env[1150]: time="2025-05-15T09:24:20.915225477Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:24:20.916828 env[1150]: time="2025-05-15T09:24:20.916781015Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505\"" May 15 09:24:20.922581 env[1150]: time="2025-05-15T09:24:20.921440223Z" level=info msg="CreateContainer within sandbox \"dcc52de5cdfb68618ac329569aeced1c7fe6404c3855037053621ec831fff0ac\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 15 09:24:20.939312 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4042531019.mount: Deactivated successfully. May 15 09:24:20.951354 env[1150]: time="2025-05-15T09:24:20.951246664Z" level=info msg="CreateContainer within sandbox \"dcc52de5cdfb68618ac329569aeced1c7fe6404c3855037053621ec831fff0ac\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"f549fc51d4b22b65ea7fc081aa0de98ae25995ca36ac8e082e9665724fe025c5\"" May 15 09:24:20.952956 env[1150]: time="2025-05-15T09:24:20.952888133Z" level=info msg="StartContainer for \"f549fc51d4b22b65ea7fc081aa0de98ae25995ca36ac8e082e9665724fe025c5\"" May 15 09:24:20.991517 systemd[1]: Started cri-containerd-f549fc51d4b22b65ea7fc081aa0de98ae25995ca36ac8e082e9665724fe025c5.scope. May 15 09:24:21.012000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:21.015784 kernel: kauditd_printk_skb: 107 callbacks suppressed May 15 09:24:21.016140 kernel: audit: type=1400 audit(1747301061.012:692): avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:21.020138 kernel: audit: type=1300 audit(1747301061.012:692): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f6569e5d598 items=0 ppid=2557 pid=2657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:21.012000 audit[2657]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f6569e5d598 items=0 ppid=2557 pid=2657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:21.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635343966633531643462323262363565613766633038316161306465 May 15 09:24:21.032573 kernel: audit: type=1327 audit(1747301061.012:692): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635343966633531643462323262363565613766633038316161306465 May 15 09:24:21.012000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:21.012000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:21.054616 kernel: audit: type=1400 audit(1747301061.012:693): avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:21.054717 kernel: audit: type=1400 audit(1747301061.012:693): avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:21.012000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:21.061250 kernel: audit: type=1400 audit(1747301061.012:693): avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:21.012000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:21.012000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:21.072926 kernel: audit: type=1400 audit(1747301061.012:693): avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:21.073286 kernel: audit: type=1400 audit(1747301061.012:693): avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:21.073375 kernel: audit: type=1400 audit(1747301061.012:693): avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:21.012000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:21.012000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:21.012000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:21.012000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:21.012000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:21.012000 audit: BPF prog-id=109 op=LOAD May 15 09:24:21.012000 audit[2657]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003050a8 items=0 ppid=2557 pid=2657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:21.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635343966633531643462323262363565613766633038316161306465 May 15 09:24:21.012000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:21.084133 kernel: audit: type=1400 audit(1747301061.012:693): avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:21.012000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:21.012000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:21.012000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:21.012000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:21.012000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:21.012000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:21.012000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:21.012000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:21.012000 audit: BPF prog-id=110 op=LOAD May 15 09:24:21.012000 audit[2657]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0003050f8 items=0 ppid=2557 pid=2657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:21.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635343966633531643462323262363565613766633038316161306465 May 15 09:24:21.013000 audit: BPF prog-id=110 op=UNLOAD May 15 09:24:21.013000 audit: BPF prog-id=109 op=UNLOAD May 15 09:24:21.013000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:21.013000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:21.013000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:21.013000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:21.013000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:21.013000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:21.013000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:21.013000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:21.013000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:21.013000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:21.013000 audit: BPF prog-id=111 op=LOAD May 15 09:24:21.013000 audit[2657]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000305188 items=0 ppid=2557 pid=2657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:21.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635343966633531643462323262363565613766633038316161306465 May 15 09:24:21.095985 env[1150]: time="2025-05-15T09:24:21.095919345Z" level=info msg="StartContainer for \"f549fc51d4b22b65ea7fc081aa0de98ae25995ca36ac8e082e9665724fe025c5\" returns successfully" May 15 09:24:21.097667 env[1150]: time="2025-05-15T09:24:21.097618111Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 15 09:24:21.672188 kubelet[1454]: E0515 09:24:21.672075 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:21.939352 systemd[1]: run-containerd-runc-k8s.io-f549fc51d4b22b65ea7fc081aa0de98ae25995ca36ac8e082e9665724fe025c5-runc.G3KgR4.mount: Deactivated successfully. May 15 09:24:22.673352 kubelet[1454]: E0515 09:24:22.673237 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:23.674626 kubelet[1454]: E0515 09:24:23.674473 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:24.675173 kubelet[1454]: E0515 09:24:24.675078 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:24.875552 env[1150]: time="2025-05-15T09:24:24.875494423Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:24:24.879367 env[1150]: time="2025-05-15T09:24:24.879341458Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:24:24.883925 env[1150]: time="2025-05-15T09:24:24.883895199Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:24:24.887385 env[1150]: time="2025-05-15T09:24:24.887353665Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:24:24.889101 env[1150]: time="2025-05-15T09:24:24.888996576Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9\"" May 15 09:24:24.893126 env[1150]: time="2025-05-15T09:24:24.893049487Z" level=info msg="CreateContainer within sandbox \"dcc52de5cdfb68618ac329569aeced1c7fe6404c3855037053621ec831fff0ac\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 15 09:24:24.925619 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3241590178.mount: Deactivated successfully. May 15 09:24:24.937444 env[1150]: time="2025-05-15T09:24:24.937213716Z" level=info msg="CreateContainer within sandbox \"dcc52de5cdfb68618ac329569aeced1c7fe6404c3855037053621ec831fff0ac\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"bc6ac85d6ae77733051289a1610848527e2576fa7bd761e6fd152999463ff13a\"" May 15 09:24:24.939237 env[1150]: time="2025-05-15T09:24:24.938950283Z" level=info msg="StartContainer for \"bc6ac85d6ae77733051289a1610848527e2576fa7bd761e6fd152999463ff13a\"" May 15 09:24:25.010704 systemd[1]: Started cri-containerd-bc6ac85d6ae77733051289a1610848527e2576fa7bd761e6fd152999463ff13a.scope. May 15 09:24:25.027000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:25.027000 audit[2698]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fcd74ce2508 items=0 ppid=2557 pid=2698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:25.027000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263366163383564366165373737333330353132383961313631303834 May 15 09:24:25.027000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:25.027000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:25.027000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:25.027000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:25.027000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:25.027000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:25.027000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:25.027000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:25.027000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:25.027000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:25.027000 audit: BPF prog-id=112 op=LOAD May 15 09:24:25.027000 audit[2698]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000f7eb8 items=0 ppid=2557 pid=2698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:25.027000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263366163383564366165373737333330353132383961313631303834 May 15 09:24:25.029000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:25.029000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:25.029000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:25.029000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:25.029000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:25.029000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:25.029000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:25.029000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:25.029000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:25.029000 audit: BPF prog-id=113 op=LOAD May 15 09:24:25.029000 audit[2698]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000f7f08 items=0 ppid=2557 pid=2698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:25.029000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263366163383564366165373737333330353132383961313631303834 May 15 09:24:25.029000 audit: BPF prog-id=113 op=UNLOAD May 15 09:24:25.029000 audit: BPF prog-id=112 op=UNLOAD May 15 09:24:25.029000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:25.029000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:25.029000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:25.029000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:25.029000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:25.029000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:25.029000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:25.029000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:25.029000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:25.029000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:25.029000 audit: BPF prog-id=114 op=LOAD May 15 09:24:25.029000 audit[2698]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000f7f98 items=0 ppid=2557 pid=2698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:25.029000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263366163383564366165373737333330353132383961313631303834 May 15 09:24:25.055519 env[1150]: time="2025-05-15T09:24:25.055455216Z" level=info msg="StartContainer for \"bc6ac85d6ae77733051289a1610848527e2576fa7bd761e6fd152999463ff13a\" returns successfully" May 15 09:24:25.155355 kubelet[1454]: I0515 09:24:25.155178 1454 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-8587fbcb89-6w2lh" podStartSLOduration=22.906419436 podStartE2EDuration="30.15498925s" podCreationTimestamp="2025-05-15 09:23:55 +0000 UTC" firstStartedPulling="2025-05-15 09:24:10.544925688 +0000 UTC m=+41.797759600" lastFinishedPulling="2025-05-15 09:24:17.793495451 +0000 UTC m=+49.046329414" observedRunningTime="2025-05-15 09:24:18.090716 +0000 UTC m=+49.343549983" watchObservedRunningTime="2025-05-15 09:24:25.15498925 +0000 UTC m=+56.407823213" May 15 09:24:25.155904 kubelet[1454]: I0515 09:24:25.155688 1454 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-vstrf" podStartSLOduration=47.230547151 podStartE2EDuration="56.155674866s" podCreationTimestamp="2025-05-15 09:23:29 +0000 UTC" firstStartedPulling="2025-05-15 09:24:15.965589899 +0000 UTC m=+47.218423811" lastFinishedPulling="2025-05-15 09:24:24.890717604 +0000 UTC m=+56.143551526" observedRunningTime="2025-05-15 09:24:25.152153793 +0000 UTC m=+56.404987735" watchObservedRunningTime="2025-05-15 09:24:25.155674866 +0000 UTC m=+56.408508828" May 15 09:24:25.675569 kubelet[1454]: E0515 09:24:25.675482 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:25.777952 kubelet[1454]: I0515 09:24:25.777858 1454 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 15 09:24:25.778965 kubelet[1454]: I0515 09:24:25.778920 1454 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 15 09:24:26.360000 audit[2728]: NETFILTER_CFG table=filter:71 family=2 entries=20 op=nft_register_rule pid=2728 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 09:24:26.365730 kernel: kauditd_printk_skb: 76 callbacks suppressed May 15 09:24:26.365821 kernel: audit: type=1325 audit(1747301066.360:704): table=filter:71 family=2 entries=20 op=nft_register_rule pid=2728 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 09:24:26.374219 kernel: audit: type=1300 audit(1747301066.360:704): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffed1af96d0 a2=0 a3=7ffed1af96bc items=0 ppid=1721 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:26.360000 audit[2728]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffed1af96d0 a2=0 a3=7ffed1af96bc items=0 ppid=1721 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:26.360000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 09:24:26.398996 kernel: audit: type=1327 audit(1747301066.360:704): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 09:24:26.400000 audit[2728]: NETFILTER_CFG table=nat:72 family=2 entries=22 op=nft_register_rule pid=2728 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 09:24:26.407151 kernel: audit: type=1325 audit(1747301066.400:705): table=nat:72 family=2 entries=22 op=nft_register_rule pid=2728 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 09:24:26.400000 audit[2728]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffed1af96d0 a2=0 a3=0 items=0 ppid=1721 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:26.413783 systemd[1]: Created slice kubepods-besteffort-pod46e2a8d9_100e_422a_9a49_8af8ab620296.slice. May 15 09:24:26.415177 kernel: audit: type=1300 audit(1747301066.400:705): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffed1af96d0 a2=0 a3=0 items=0 ppid=1721 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:26.400000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 09:24:26.420118 kernel: audit: type=1327 audit(1747301066.400:705): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 09:24:26.428000 audit[2732]: NETFILTER_CFG table=filter:73 family=2 entries=32 op=nft_register_rule pid=2732 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 09:24:26.428000 audit[2732]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7fff4d93c880 a2=0 a3=7fff4d93c86c items=0 ppid=1721 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:26.451187 kernel: audit: type=1325 audit(1747301066.428:706): table=filter:73 family=2 entries=32 op=nft_register_rule pid=2732 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 09:24:26.460340 kernel: audit: type=1300 audit(1747301066.428:706): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7fff4d93c880 a2=0 a3=7fff4d93c86c items=0 ppid=1721 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:26.460434 kernel: audit: type=1327 audit(1747301066.428:706): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 09:24:26.428000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 09:24:26.455000 audit[2732]: NETFILTER_CFG table=nat:74 family=2 entries=22 op=nft_register_rule pid=2732 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 09:24:26.464695 kernel: audit: type=1325 audit(1747301066.455:707): table=nat:74 family=2 entries=22 op=nft_register_rule pid=2732 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 09:24:26.455000 audit[2732]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff4d93c880 a2=0 a3=0 items=0 ppid=1721 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:26.455000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 09:24:26.526600 kubelet[1454]: I0515 09:24:26.526476 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/46e2a8d9-100e-422a-9a49-8af8ab620296-data\") pod \"nfs-server-provisioner-0\" (UID: \"46e2a8d9-100e-422a-9a49-8af8ab620296\") " pod="default/nfs-server-provisioner-0" May 15 09:24:26.526932 kubelet[1454]: I0515 09:24:26.526908 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tdrfd\" (UniqueName: \"kubernetes.io/projected/46e2a8d9-100e-422a-9a49-8af8ab620296-kube-api-access-tdrfd\") pod \"nfs-server-provisioner-0\" (UID: \"46e2a8d9-100e-422a-9a49-8af8ab620296\") " pod="default/nfs-server-provisioner-0" May 15 09:24:26.686354 kubelet[1454]: E0515 09:24:26.679027 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:26.735429 env[1150]: time="2025-05-15T09:24:26.735160685Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:46e2a8d9-100e-422a-9a49-8af8ab620296,Namespace:default,Attempt:0,}" May 15 09:24:27.102031 systemd-networkd[986]: cali60e51b789ff: Link UP May 15 09:24:27.111979 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 09:24:27.112478 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready May 15 09:24:27.114287 systemd-networkd[986]: cali60e51b789ff: Gained carrier May 15 09:24:27.153903 env[1150]: 2025-05-15 09:24:26.883 [INFO][2735] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.111-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 46e2a8d9-100e-422a-9a49-8af8ab620296 1462 0 2025-05-15 09:24:26 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 172.24.4.111 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="5d4d7b45d7e786d6fd60005ffc3de97b4189babc3d0757c50e77f0f694fc2376" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.111-k8s-nfs--server--provisioner--0-" May 15 09:24:27.153903 env[1150]: 2025-05-15 09:24:26.885 [INFO][2735] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="5d4d7b45d7e786d6fd60005ffc3de97b4189babc3d0757c50e77f0f694fc2376" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.111-k8s-nfs--server--provisioner--0-eth0" May 15 09:24:27.153903 env[1150]: 2025-05-15 09:24:26.976 [INFO][2747] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5d4d7b45d7e786d6fd60005ffc3de97b4189babc3d0757c50e77f0f694fc2376" HandleID="k8s-pod-network.5d4d7b45d7e786d6fd60005ffc3de97b4189babc3d0757c50e77f0f694fc2376" Workload="172.24.4.111-k8s-nfs--server--provisioner--0-eth0" May 15 09:24:27.153903 env[1150]: 2025-05-15 09:24:27.003 [INFO][2747] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="5d4d7b45d7e786d6fd60005ffc3de97b4189babc3d0757c50e77f0f694fc2376" HandleID="k8s-pod-network.5d4d7b45d7e786d6fd60005ffc3de97b4189babc3d0757c50e77f0f694fc2376" Workload="172.24.4.111-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003e26d0), Attrs:map[string]string{"namespace":"default", "node":"172.24.4.111", "pod":"nfs-server-provisioner-0", "timestamp":"2025-05-15 09:24:26.976883779 +0000 UTC"}, Hostname:"172.24.4.111", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 09:24:27.153903 env[1150]: 2025-05-15 09:24:27.003 [INFO][2747] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 09:24:27.153903 env[1150]: 2025-05-15 09:24:27.003 [INFO][2747] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 09:24:27.153903 env[1150]: 2025-05-15 09:24:27.003 [INFO][2747] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.111' May 15 09:24:27.153903 env[1150]: 2025-05-15 09:24:27.009 [INFO][2747] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5d4d7b45d7e786d6fd60005ffc3de97b4189babc3d0757c50e77f0f694fc2376" host="172.24.4.111" May 15 09:24:27.153903 env[1150]: 2025-05-15 09:24:27.030 [INFO][2747] ipam/ipam.go 372: Looking up existing affinities for host host="172.24.4.111" May 15 09:24:27.153903 env[1150]: 2025-05-15 09:24:27.042 [INFO][2747] ipam/ipam.go 489: Trying affinity for 192.168.20.192/26 host="172.24.4.111" May 15 09:24:27.153903 env[1150]: 2025-05-15 09:24:27.046 [INFO][2747] ipam/ipam.go 155: Attempting to load block cidr=192.168.20.192/26 host="172.24.4.111" May 15 09:24:27.153903 env[1150]: 2025-05-15 09:24:27.053 [INFO][2747] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.20.192/26 host="172.24.4.111" May 15 09:24:27.153903 env[1150]: 2025-05-15 09:24:27.053 [INFO][2747] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.20.192/26 handle="k8s-pod-network.5d4d7b45d7e786d6fd60005ffc3de97b4189babc3d0757c50e77f0f694fc2376" host="172.24.4.111" May 15 09:24:27.153903 env[1150]: 2025-05-15 09:24:27.057 [INFO][2747] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.5d4d7b45d7e786d6fd60005ffc3de97b4189babc3d0757c50e77f0f694fc2376 May 15 09:24:27.153903 env[1150]: 2025-05-15 09:24:27.067 [INFO][2747] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.20.192/26 handle="k8s-pod-network.5d4d7b45d7e786d6fd60005ffc3de97b4189babc3d0757c50e77f0f694fc2376" host="172.24.4.111" May 15 09:24:27.153903 env[1150]: 2025-05-15 09:24:27.085 [INFO][2747] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.20.195/26] block=192.168.20.192/26 handle="k8s-pod-network.5d4d7b45d7e786d6fd60005ffc3de97b4189babc3d0757c50e77f0f694fc2376" host="172.24.4.111" May 15 09:24:27.153903 env[1150]: 2025-05-15 09:24:27.085 [INFO][2747] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.20.195/26] handle="k8s-pod-network.5d4d7b45d7e786d6fd60005ffc3de97b4189babc3d0757c50e77f0f694fc2376" host="172.24.4.111" May 15 09:24:27.153903 env[1150]: 2025-05-15 09:24:27.085 [INFO][2747] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 09:24:27.153903 env[1150]: 2025-05-15 09:24:27.085 [INFO][2747] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.20.195/26] IPv6=[] ContainerID="5d4d7b45d7e786d6fd60005ffc3de97b4189babc3d0757c50e77f0f694fc2376" HandleID="k8s-pod-network.5d4d7b45d7e786d6fd60005ffc3de97b4189babc3d0757c50e77f0f694fc2376" Workload="172.24.4.111-k8s-nfs--server--provisioner--0-eth0" May 15 09:24:27.157620 env[1150]: 2025-05-15 09:24:27.089 [INFO][2735] cni-plugin/k8s.go 386: Populated endpoint ContainerID="5d4d7b45d7e786d6fd60005ffc3de97b4189babc3d0757c50e77f0f694fc2376" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.111-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.111-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"46e2a8d9-100e-422a-9a49-8af8ab620296", ResourceVersion:"1462", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 9, 24, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.111", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.20.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 09:24:27.157620 env[1150]: 2025-05-15 09:24:27.089 [INFO][2735] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.20.195/32] ContainerID="5d4d7b45d7e786d6fd60005ffc3de97b4189babc3d0757c50e77f0f694fc2376" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.111-k8s-nfs--server--provisioner--0-eth0" May 15 09:24:27.157620 env[1150]: 2025-05-15 09:24:27.089 [INFO][2735] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="5d4d7b45d7e786d6fd60005ffc3de97b4189babc3d0757c50e77f0f694fc2376" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.111-k8s-nfs--server--provisioner--0-eth0" May 15 09:24:27.157620 env[1150]: 2025-05-15 09:24:27.118 [INFO][2735] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="5d4d7b45d7e786d6fd60005ffc3de97b4189babc3d0757c50e77f0f694fc2376" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.111-k8s-nfs--server--provisioner--0-eth0" May 15 09:24:27.158239 env[1150]: 2025-05-15 09:24:27.121 [INFO][2735] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="5d4d7b45d7e786d6fd60005ffc3de97b4189babc3d0757c50e77f0f694fc2376" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.111-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.111-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"46e2a8d9-100e-422a-9a49-8af8ab620296", ResourceVersion:"1462", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 9, 24, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.111", ContainerID:"5d4d7b45d7e786d6fd60005ffc3de97b4189babc3d0757c50e77f0f694fc2376", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.20.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"56:f0:65:ce:6e:2c", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 09:24:27.158239 env[1150]: 2025-05-15 09:24:27.150 [INFO][2735] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="5d4d7b45d7e786d6fd60005ffc3de97b4189babc3d0757c50e77f0f694fc2376" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.111-k8s-nfs--server--provisioner--0-eth0" May 15 09:24:27.184000 audit[2764]: NETFILTER_CFG table=filter:75 family=2 entries=38 op=nft_register_chain pid=2764 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 09:24:27.184000 audit[2764]: SYSCALL arch=c000003e syscall=46 success=yes exit=19820 a0=3 a1=7ffe1eb65860 a2=0 a3=7ffe1eb6584c items=0 ppid=2191 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:27.184000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 09:24:27.203679 env[1150]: time="2025-05-15T09:24:27.202780547Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 09:24:27.203679 env[1150]: time="2025-05-15T09:24:27.202941137Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 09:24:27.203679 env[1150]: time="2025-05-15T09:24:27.202972126Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 09:24:27.204266 env[1150]: time="2025-05-15T09:24:27.204172603Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5d4d7b45d7e786d6fd60005ffc3de97b4189babc3d0757c50e77f0f694fc2376 pid=2776 runtime=io.containerd.runc.v2 May 15 09:24:27.234749 systemd[1]: Started cri-containerd-5d4d7b45d7e786d6fd60005ffc3de97b4189babc3d0757c50e77f0f694fc2376.scope. May 15 09:24:27.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:27.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:27.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:27.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:27.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:27.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:27.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:27.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:27.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:27.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:27.255000 audit: BPF prog-id=115 op=LOAD May 15 09:24:27.255000 audit[2787]: AVC avc: denied { bpf } for pid=2787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:27.255000 audit[2787]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2776 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:27.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564346437623435643765373836643666643630303035666663336465 May 15 09:24:27.255000 audit[2787]: AVC avc: denied { perfmon } for pid=2787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:27.255000 audit[2787]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2776 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:27.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564346437623435643765373836643666643630303035666663336465 May 15 09:24:27.255000 audit[2787]: AVC avc: denied { bpf } for pid=2787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:27.255000 audit[2787]: AVC avc: denied { bpf } for pid=2787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:27.255000 audit[2787]: AVC avc: denied { bpf } for pid=2787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:27.255000 audit[2787]: AVC avc: denied { perfmon } for pid=2787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:27.255000 audit[2787]: AVC avc: denied { perfmon } for pid=2787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:27.255000 audit[2787]: AVC avc: denied { perfmon } for pid=2787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:27.255000 audit[2787]: AVC avc: denied { perfmon } for pid=2787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:27.255000 audit[2787]: AVC avc: denied { perfmon } for pid=2787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:27.255000 audit[2787]: AVC avc: denied { bpf } for pid=2787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:27.255000 audit[2787]: AVC avc: denied { bpf } for pid=2787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:27.255000 audit: BPF prog-id=116 op=LOAD May 15 09:24:27.255000 audit[2787]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000400f50 items=0 ppid=2776 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:27.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564346437623435643765373836643666643630303035666663336465 May 15 09:24:27.256000 audit[2787]: AVC avc: denied { bpf } for pid=2787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:27.256000 audit[2787]: AVC avc: denied { bpf } for pid=2787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:27.256000 audit[2787]: AVC avc: denied { perfmon } for pid=2787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:27.256000 audit[2787]: AVC avc: denied { perfmon } for pid=2787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:27.256000 audit[2787]: AVC avc: denied { perfmon } for pid=2787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:27.256000 audit[2787]: AVC avc: denied { perfmon } for pid=2787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:27.256000 audit[2787]: AVC avc: denied { perfmon } for pid=2787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:27.256000 audit[2787]: AVC avc: denied { bpf } for pid=2787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:27.256000 audit[2787]: AVC avc: denied { bpf } for pid=2787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:27.256000 audit: BPF prog-id=117 op=LOAD May 15 09:24:27.256000 audit[2787]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000400f98 items=0 ppid=2776 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:27.256000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564346437623435643765373836643666643630303035666663336465 May 15 09:24:27.256000 audit: BPF prog-id=117 op=UNLOAD May 15 09:24:27.256000 audit: BPF prog-id=116 op=UNLOAD May 15 09:24:27.256000 audit[2787]: AVC avc: denied { bpf } for pid=2787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:27.256000 audit[2787]: AVC avc: denied { bpf } for pid=2787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:27.256000 audit[2787]: AVC avc: denied { bpf } for pid=2787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:27.256000 audit[2787]: AVC avc: denied { perfmon } for pid=2787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:27.256000 audit[2787]: AVC avc: denied { perfmon } for pid=2787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:27.256000 audit[2787]: AVC avc: denied { perfmon } for pid=2787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:27.256000 audit[2787]: AVC avc: denied { perfmon } for pid=2787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:27.256000 audit[2787]: AVC avc: denied { perfmon } for pid=2787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:27.256000 audit[2787]: AVC avc: denied { bpf } for pid=2787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:27.256000 audit[2787]: AVC avc: denied { bpf } for pid=2787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:27.256000 audit: BPF prog-id=118 op=LOAD May 15 09:24:27.256000 audit[2787]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0004013a8 items=0 ppid=2776 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:27.256000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564346437623435643765373836643666643630303035666663336465 May 15 09:24:27.288953 env[1150]: time="2025-05-15T09:24:27.288862095Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:46e2a8d9-100e-422a-9a49-8af8ab620296,Namespace:default,Attempt:0,} returns sandbox id \"5d4d7b45d7e786d6fd60005ffc3de97b4189babc3d0757c50e77f0f694fc2376\"" May 15 09:24:27.292109 env[1150]: time="2025-05-15T09:24:27.291949304Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" May 15 09:24:27.674311 systemd[1]: run-containerd-runc-k8s.io-5d4d7b45d7e786d6fd60005ffc3de97b4189babc3d0757c50e77f0f694fc2376-runc.2EbP25.mount: Deactivated successfully. May 15 09:24:27.680659 kubelet[1454]: E0515 09:24:27.680541 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:28.683263 kubelet[1454]: E0515 09:24:28.681978 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:29.079617 systemd-networkd[986]: cali60e51b789ff: Gained IPv6LL May 15 09:24:29.585631 kubelet[1454]: E0515 09:24:29.585513 1454 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:29.653746 env[1150]: time="2025-05-15T09:24:29.653378321Z" level=info msg="StopPodSandbox for \"3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f\"" May 15 09:24:29.682452 kubelet[1454]: E0515 09:24:29.682381 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:29.869956 env[1150]: 2025-05-15 09:24:29.780 [WARNING][2824] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.111-k8s-csi--node--driver--vstrf-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ed417abd-ce43-46d6-b289-3aa9eba2746f", ResourceVersion:"1438", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 9, 23, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.111", ContainerID:"dcc52de5cdfb68618ac329569aeced1c7fe6404c3855037053621ec831fff0ac", Pod:"csi-node-driver-vstrf", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.20.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali184e6486efc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 09:24:29.869956 env[1150]: 2025-05-15 09:24:29.781 [INFO][2824] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f" May 15 09:24:29.869956 env[1150]: 2025-05-15 09:24:29.781 [INFO][2824] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f" iface="eth0" netns="" May 15 09:24:29.869956 env[1150]: 2025-05-15 09:24:29.781 [INFO][2824] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f" May 15 09:24:29.869956 env[1150]: 2025-05-15 09:24:29.781 [INFO][2824] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f" May 15 09:24:29.869956 env[1150]: 2025-05-15 09:24:29.841 [INFO][2831] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f" HandleID="k8s-pod-network.3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f" Workload="172.24.4.111-k8s-csi--node--driver--vstrf-eth0" May 15 09:24:29.869956 env[1150]: 2025-05-15 09:24:29.842 [INFO][2831] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 09:24:29.869956 env[1150]: 2025-05-15 09:24:29.842 [INFO][2831] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 09:24:29.869956 env[1150]: 2025-05-15 09:24:29.860 [WARNING][2831] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f" HandleID="k8s-pod-network.3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f" Workload="172.24.4.111-k8s-csi--node--driver--vstrf-eth0" May 15 09:24:29.869956 env[1150]: 2025-05-15 09:24:29.860 [INFO][2831] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f" HandleID="k8s-pod-network.3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f" Workload="172.24.4.111-k8s-csi--node--driver--vstrf-eth0" May 15 09:24:29.869956 env[1150]: 2025-05-15 09:24:29.865 [INFO][2831] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 09:24:29.869956 env[1150]: 2025-05-15 09:24:29.867 [INFO][2824] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f" May 15 09:24:29.869956 env[1150]: time="2025-05-15T09:24:29.869297449Z" level=info msg="TearDown network for sandbox \"3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f\" successfully" May 15 09:24:29.869956 env[1150]: time="2025-05-15T09:24:29.869370499Z" level=info msg="StopPodSandbox for \"3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f\" returns successfully" May 15 09:24:29.873758 env[1150]: time="2025-05-15T09:24:29.873679274Z" level=info msg="RemovePodSandbox for \"3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f\"" May 15 09:24:29.874246 env[1150]: time="2025-05-15T09:24:29.873983591Z" level=info msg="Forcibly stopping sandbox \"3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f\"" May 15 09:24:30.060369 env[1150]: 2025-05-15 09:24:30.003 [WARNING][2854] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.111-k8s-csi--node--driver--vstrf-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ed417abd-ce43-46d6-b289-3aa9eba2746f", ResourceVersion:"1438", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 9, 23, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.111", ContainerID:"dcc52de5cdfb68618ac329569aeced1c7fe6404c3855037053621ec831fff0ac", Pod:"csi-node-driver-vstrf", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.20.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali184e6486efc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 09:24:30.060369 env[1150]: 2025-05-15 09:24:30.004 [INFO][2854] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f" May 15 09:24:30.060369 env[1150]: 2025-05-15 09:24:30.004 [INFO][2854] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f" iface="eth0" netns="" May 15 09:24:30.060369 env[1150]: 2025-05-15 09:24:30.004 [INFO][2854] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f" May 15 09:24:30.060369 env[1150]: 2025-05-15 09:24:30.004 [INFO][2854] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f" May 15 09:24:30.060369 env[1150]: 2025-05-15 09:24:30.033 [INFO][2864] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f" HandleID="k8s-pod-network.3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f" Workload="172.24.4.111-k8s-csi--node--driver--vstrf-eth0" May 15 09:24:30.060369 env[1150]: 2025-05-15 09:24:30.033 [INFO][2864] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 09:24:30.060369 env[1150]: 2025-05-15 09:24:30.033 [INFO][2864] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 09:24:30.060369 env[1150]: 2025-05-15 09:24:30.051 [WARNING][2864] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f" HandleID="k8s-pod-network.3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f" Workload="172.24.4.111-k8s-csi--node--driver--vstrf-eth0" May 15 09:24:30.060369 env[1150]: 2025-05-15 09:24:30.051 [INFO][2864] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f" HandleID="k8s-pod-network.3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f" Workload="172.24.4.111-k8s-csi--node--driver--vstrf-eth0" May 15 09:24:30.060369 env[1150]: 2025-05-15 09:24:30.054 [INFO][2864] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 09:24:30.060369 env[1150]: 2025-05-15 09:24:30.055 [INFO][2854] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f" May 15 09:24:30.061280 env[1150]: time="2025-05-15T09:24:30.061239666Z" level=info msg="TearDown network for sandbox \"3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f\" successfully" May 15 09:24:30.070259 env[1150]: time="2025-05-15T09:24:30.070223920Z" level=info msg="RemovePodSandbox \"3c3becd5a57aa3d50a7b15cb3a11415dc612cbc8d9865788601e49425aa6761f\" returns successfully" May 15 09:24:30.073886 env[1150]: time="2025-05-15T09:24:30.073821248Z" level=info msg="StopPodSandbox for \"4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96\"" May 15 09:24:30.357463 env[1150]: 2025-05-15 09:24:30.244 [WARNING][2883] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.111-k8s-nginx--deployment--8587fbcb89--6w2lh-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"8c5d96a4-aa72-487c-aaac-e258324851f1", ResourceVersion:"1415", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 9, 23, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.111", ContainerID:"10a68ff4d2628e2037e28721ca1bb5d4d6db8ca16278cafe01e175851ea2a213", Pod:"nginx-deployment-8587fbcb89-6w2lh", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.20.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali704ce9a1b89", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 09:24:30.357463 env[1150]: 2025-05-15 09:24:30.244 [INFO][2883] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96" May 15 09:24:30.357463 env[1150]: 2025-05-15 09:24:30.244 [INFO][2883] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96" iface="eth0" netns="" May 15 09:24:30.357463 env[1150]: 2025-05-15 09:24:30.244 [INFO][2883] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96" May 15 09:24:30.357463 env[1150]: 2025-05-15 09:24:30.244 [INFO][2883] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96" May 15 09:24:30.357463 env[1150]: 2025-05-15 09:24:30.308 [INFO][2890] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96" HandleID="k8s-pod-network.4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96" Workload="172.24.4.111-k8s-nginx--deployment--8587fbcb89--6w2lh-eth0" May 15 09:24:30.357463 env[1150]: 2025-05-15 09:24:30.309 [INFO][2890] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 09:24:30.357463 env[1150]: 2025-05-15 09:24:30.311 [INFO][2890] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 09:24:30.357463 env[1150]: 2025-05-15 09:24:30.331 [WARNING][2890] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96" HandleID="k8s-pod-network.4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96" Workload="172.24.4.111-k8s-nginx--deployment--8587fbcb89--6w2lh-eth0" May 15 09:24:30.357463 env[1150]: 2025-05-15 09:24:30.331 [INFO][2890] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96" HandleID="k8s-pod-network.4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96" Workload="172.24.4.111-k8s-nginx--deployment--8587fbcb89--6w2lh-eth0" May 15 09:24:30.357463 env[1150]: 2025-05-15 09:24:30.334 [INFO][2890] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 09:24:30.357463 env[1150]: 2025-05-15 09:24:30.335 [INFO][2883] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96" May 15 09:24:30.358155 env[1150]: time="2025-05-15T09:24:30.357486438Z" level=info msg="TearDown network for sandbox \"4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96\" successfully" May 15 09:24:30.358155 env[1150]: time="2025-05-15T09:24:30.357529110Z" level=info msg="StopPodSandbox for \"4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96\" returns successfully" May 15 09:24:30.358513 env[1150]: time="2025-05-15T09:24:30.357946594Z" level=info msg="RemovePodSandbox for \"4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96\"" May 15 09:24:30.358570 env[1150]: time="2025-05-15T09:24:30.358523176Z" level=info msg="Forcibly stopping sandbox \"4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96\"" May 15 09:24:30.554299 env[1150]: 2025-05-15 09:24:30.494 [WARNING][2912] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.111-k8s-nginx--deployment--8587fbcb89--6w2lh-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"8c5d96a4-aa72-487c-aaac-e258324851f1", ResourceVersion:"1415", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 9, 23, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.111", ContainerID:"10a68ff4d2628e2037e28721ca1bb5d4d6db8ca16278cafe01e175851ea2a213", Pod:"nginx-deployment-8587fbcb89-6w2lh", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.20.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali704ce9a1b89", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 09:24:30.554299 env[1150]: 2025-05-15 09:24:30.494 [INFO][2912] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96" May 15 09:24:30.554299 env[1150]: 2025-05-15 09:24:30.494 [INFO][2912] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96" iface="eth0" netns="" May 15 09:24:30.554299 env[1150]: 2025-05-15 09:24:30.494 [INFO][2912] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96" May 15 09:24:30.554299 env[1150]: 2025-05-15 09:24:30.494 [INFO][2912] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96" May 15 09:24:30.554299 env[1150]: 2025-05-15 09:24:30.532 [INFO][2919] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96" HandleID="k8s-pod-network.4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96" Workload="172.24.4.111-k8s-nginx--deployment--8587fbcb89--6w2lh-eth0" May 15 09:24:30.554299 env[1150]: 2025-05-15 09:24:30.532 [INFO][2919] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 09:24:30.554299 env[1150]: 2025-05-15 09:24:30.532 [INFO][2919] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 09:24:30.554299 env[1150]: 2025-05-15 09:24:30.547 [WARNING][2919] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96" HandleID="k8s-pod-network.4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96" Workload="172.24.4.111-k8s-nginx--deployment--8587fbcb89--6w2lh-eth0" May 15 09:24:30.554299 env[1150]: 2025-05-15 09:24:30.547 [INFO][2919] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96" HandleID="k8s-pod-network.4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96" Workload="172.24.4.111-k8s-nginx--deployment--8587fbcb89--6w2lh-eth0" May 15 09:24:30.554299 env[1150]: 2025-05-15 09:24:30.550 [INFO][2919] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 09:24:30.554299 env[1150]: 2025-05-15 09:24:30.551 [INFO][2912] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96" May 15 09:24:30.555273 env[1150]: time="2025-05-15T09:24:30.555233197Z" level=info msg="TearDown network for sandbox \"4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96\" successfully" May 15 09:24:30.559481 env[1150]: time="2025-05-15T09:24:30.559449448Z" level=info msg="RemovePodSandbox \"4d243ec61b76853b522a1c0cd2e6e70b19a4b5c834829705bc8e517c495e0e96\" returns successfully" May 15 09:24:30.685810 kubelet[1454]: E0515 09:24:30.683963 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:31.685353 kubelet[1454]: E0515 09:24:31.684815 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:32.121422 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4188579604.mount: Deactivated successfully. May 15 09:24:32.688245 kubelet[1454]: E0515 09:24:32.688165 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:33.688925 kubelet[1454]: E0515 09:24:33.688839 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:34.690210 kubelet[1454]: E0515 09:24:34.690051 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:35.195727 env[1150]: time="2025-05-15T09:24:35.195426949Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:24:35.202615 env[1150]: time="2025-05-15T09:24:35.199702827Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:24:35.208304 env[1150]: time="2025-05-15T09:24:35.208215927Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:24:35.213264 env[1150]: time="2025-05-15T09:24:35.213168724Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" May 15 09:24:35.213933 env[1150]: time="2025-05-15T09:24:35.213527824Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:24:35.226830 env[1150]: time="2025-05-15T09:24:35.226740446Z" level=info msg="CreateContainer within sandbox \"5d4d7b45d7e786d6fd60005ffc3de97b4189babc3d0757c50e77f0f694fc2376\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" May 15 09:24:35.259525 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3735013269.mount: Deactivated successfully. May 15 09:24:35.268784 env[1150]: time="2025-05-15T09:24:35.268661464Z" level=info msg="CreateContainer within sandbox \"5d4d7b45d7e786d6fd60005ffc3de97b4189babc3d0757c50e77f0f694fc2376\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"f567fdb6890eecf3b21675376149f6ced8ca35d9a9a099052134ea125ee4fb5e\"" May 15 09:24:35.270665 env[1150]: time="2025-05-15T09:24:35.270587852Z" level=info msg="StartContainer for \"f567fdb6890eecf3b21675376149f6ced8ca35d9a9a099052134ea125ee4fb5e\"" May 15 09:24:35.317184 systemd[1]: Started cri-containerd-f567fdb6890eecf3b21675376149f6ced8ca35d9a9a099052134ea125ee4fb5e.scope. May 15 09:24:35.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:35.344668 kernel: kauditd_printk_skb: 62 callbacks suppressed May 15 09:24:35.344846 kernel: audit: type=1400 audit(1747301075.336:727): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:35.344954 kernel: audit: type=1400 audit(1747301075.336:728): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:35.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:35.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:35.353867 kernel: audit: type=1400 audit(1747301075.336:729): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:35.353941 kernel: audit: type=1400 audit(1747301075.336:730): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:35.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:35.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:35.363264 kernel: audit: type=1400 audit(1747301075.336:731): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:35.363367 kernel: audit: type=1400 audit(1747301075.336:732): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:35.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:35.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:35.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:35.377607 kernel: audit: type=1400 audit(1747301075.336:733): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:35.377708 kernel: audit: type=1400 audit(1747301075.336:734): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:35.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:35.382623 kernel: audit: type=1400 audit(1747301075.336:735): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:35.382885 kernel: audit: type=1400 audit(1747301075.344:736): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:35.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:35.348000 audit: BPF prog-id=119 op=LOAD May 15 09:24:35.348000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:35.348000 audit[2954]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2776 pid=2954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:35.348000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635363766646236383930656563663362323136373533373631343966 May 15 09:24:35.348000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:35.348000 audit[2954]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2776 pid=2954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:35.348000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635363766646236383930656563663362323136373533373631343966 May 15 09:24:35.348000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:35.348000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:35.348000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:35.348000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:35.348000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:35.348000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:35.348000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:35.348000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:35.348000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:35.348000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:35.348000 audit: BPF prog-id=120 op=LOAD May 15 09:24:35.348000 audit[2954]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003dc020 items=0 ppid=2776 pid=2954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:35.348000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635363766646236383930656563663362323136373533373631343966 May 15 09:24:35.362000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:35.362000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:35.362000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:35.362000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:35.362000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:35.362000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:35.362000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:35.362000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:35.362000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:35.362000 audit: BPF prog-id=121 op=LOAD May 15 09:24:35.362000 audit[2954]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003dc068 items=0 ppid=2776 pid=2954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:35.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635363766646236383930656563663362323136373533373631343966 May 15 09:24:35.372000 audit: BPF prog-id=121 op=UNLOAD May 15 09:24:35.372000 audit: BPF prog-id=120 op=UNLOAD May 15 09:24:35.372000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:35.372000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:35.372000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:35.372000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:35.372000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:35.372000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:35.372000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:35.372000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:35.372000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:35.372000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:24:35.372000 audit: BPF prog-id=122 op=LOAD May 15 09:24:35.372000 audit[2954]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003dc478 items=0 ppid=2776 pid=2954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:35.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635363766646236383930656563663362323136373533373631343966 May 15 09:24:35.413526 env[1150]: time="2025-05-15T09:24:35.413443656Z" level=info msg="StartContainer for \"f567fdb6890eecf3b21675376149f6ced8ca35d9a9a099052134ea125ee4fb5e\" returns successfully" May 15 09:24:35.468000 audit[2983]: AVC avc: denied { search } for pid=2983 comm="rpcbind" name="crypto" dev="proc" ino=21399 scontext=system_u:system_r:svirt_lxc_net_t:s0:c23,c702 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 15 09:24:35.468000 audit[2983]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f746fee40c0 a2=0 a3=0 items=0 ppid=2965 pid=2983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c23,c702 key=(null) May 15 09:24:35.468000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 May 15 09:24:35.506717 kubelet[1454]: I0515 09:24:35.506484 1454 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.578919527 podStartE2EDuration="9.50638581s" podCreationTimestamp="2025-05-15 09:24:26 +0000 UTC" firstStartedPulling="2025-05-15 09:24:27.290830986 +0000 UTC m=+58.543664898" lastFinishedPulling="2025-05-15 09:24:35.218297269 +0000 UTC m=+66.471131181" observedRunningTime="2025-05-15 09:24:35.502246845 +0000 UTC m=+66.755080777" watchObservedRunningTime="2025-05-15 09:24:35.50638581 +0000 UTC m=+66.759219732" May 15 09:24:35.522000 audit[2988]: AVC avc: denied { search } for pid=2988 comm="dbus-daemon" name="crypto" dev="proc" ino=21399 scontext=system_u:system_r:svirt_lxc_net_t:s0:c23,c702 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 15 09:24:35.522000 audit[2988]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f30900970c0 a2=0 a3=0 items=0 ppid=2965 pid=2988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c23,c702 key=(null) May 15 09:24:35.522000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 15 09:24:35.527000 audit[2989]: AVC avc: denied { watch } for pid=2989 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538200 scontext=system_u:system_r:svirt_lxc_net_t:s0:c23,c702 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c23,c702 tclass=dir permissive=0 May 15 09:24:35.527000 audit[2989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55f3821f0be0 a2=2c8 a3=7fff68c1b0bc items=0 ppid=2988 pid=2989 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c23,c702 key=(null) May 15 09:24:35.527000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 15 09:24:35.539000 audit[2990]: AVC avc: denied { read } for pid=2990 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=21419 scontext=system_u:system_r:svirt_lxc_net_t:s0:c23,c702 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 May 15 09:24:35.539000 audit[2990]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7ff824ac4320 a1=80000 a2=d a3=7ffcb38f8670 items=0 ppid=2965 pid=2990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c23,c702 key=(null) May 15 09:24:35.539000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 15 09:24:35.542000 audit[2990]: AVC avc: denied { search } for pid=2990 comm="ganesha.nfsd" name="crypto" dev="proc" ino=21399 scontext=system_u:system_r:svirt_lxc_net_t:s0:c23,c702 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 15 09:24:35.542000 audit[2990]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7ff8240180c0 a2=0 a3=0 items=0 ppid=2965 pid=2990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c23,c702 key=(null) May 15 09:24:35.542000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 15 09:24:35.563000 audit[2995]: NETFILTER_CFG table=filter:76 family=2 entries=20 op=nft_register_rule pid=2995 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 09:24:35.563000 audit[2995]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffdfdd33720 a2=0 a3=7ffdfdd3370c items=0 ppid=1721 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:35.563000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 09:24:35.570000 audit[2995]: NETFILTER_CFG table=nat:77 family=2 entries=106 op=nft_register_chain pid=2995 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 09:24:35.570000 audit[2995]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffdfdd33720 a2=0 a3=7ffdfdd3370c items=0 ppid=1721 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:35.570000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 09:24:35.691439 kubelet[1454]: E0515 09:24:35.691229 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:36.692169 kubelet[1454]: E0515 09:24:36.692056 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:37.693619 kubelet[1454]: E0515 09:24:37.693546 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:38.695234 kubelet[1454]: E0515 09:24:38.695128 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:39.695450 kubelet[1454]: E0515 09:24:39.695366 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:40.696790 kubelet[1454]: E0515 09:24:40.696684 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:41.697601 kubelet[1454]: E0515 09:24:41.697472 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:42.698583 kubelet[1454]: E0515 09:24:42.698498 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:43.699776 kubelet[1454]: E0515 09:24:43.699636 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:44.701008 kubelet[1454]: E0515 09:24:44.700873 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:45.701285 kubelet[1454]: E0515 09:24:45.701166 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:46.701550 kubelet[1454]: E0515 09:24:46.701414 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:47.702414 kubelet[1454]: E0515 09:24:47.702300 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:48.703080 kubelet[1454]: E0515 09:24:48.703014 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:49.585728 kubelet[1454]: E0515 09:24:49.585625 1454 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:49.705148 kubelet[1454]: E0515 09:24:49.704973 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:50.705525 kubelet[1454]: E0515 09:24:50.705453 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:51.706756 kubelet[1454]: E0515 09:24:51.706662 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:52.708253 kubelet[1454]: E0515 09:24:52.708188 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:53.710151 kubelet[1454]: E0515 09:24:53.709929 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:54.710364 kubelet[1454]: E0515 09:24:54.710301 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:55.712194 kubelet[1454]: E0515 09:24:55.712031 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:56.713252 kubelet[1454]: E0515 09:24:56.713185 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:57.714862 kubelet[1454]: E0515 09:24:57.714791 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:58.716956 kubelet[1454]: E0515 09:24:58.716884 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:24:59.718663 kubelet[1454]: E0515 09:24:59.718597 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:00.319463 systemd[1]: Created slice kubepods-besteffort-pod6a9209cb_e400_4609_a802_dab0d18975ed.slice. May 15 09:25:00.426159 kubelet[1454]: I0515 09:25:00.425921 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-bf47611b-b0e3-4926-91b5-5208305a1227\" (UniqueName: \"kubernetes.io/nfs/6a9209cb-e400-4609-a802-dab0d18975ed-pvc-bf47611b-b0e3-4926-91b5-5208305a1227\") pod \"test-pod-1\" (UID: \"6a9209cb-e400-4609-a802-dab0d18975ed\") " pod="default/test-pod-1" May 15 09:25:00.426580 kubelet[1454]: I0515 09:25:00.426311 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-t96sv\" (UniqueName: \"kubernetes.io/projected/6a9209cb-e400-4609-a802-dab0d18975ed-kube-api-access-t96sv\") pod \"test-pod-1\" (UID: \"6a9209cb-e400-4609-a802-dab0d18975ed\") " pod="default/test-pod-1" May 15 09:25:00.606018 kernel: Failed to create system directory netfs May 15 09:25:00.606713 kernel: kauditd_printk_skb: 68 callbacks suppressed May 15 09:25:00.607035 kernel: audit: type=1400 audit(1747301100.570:752): avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.607353 kernel: Failed to create system directory netfs May 15 09:25:00.607442 kernel: Failed to create system directory netfs May 15 09:25:00.607492 kernel: Failed to create system directory netfs May 15 09:25:00.570000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.624164 kernel: audit: type=1400 audit(1747301100.570:752): avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.570000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.570000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.648644 kernel: audit: type=1400 audit(1747301100.570:752): avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.648697 kernel: Failed to create system directory fscache May 15 09:25:00.648736 kernel: audit: type=1400 audit(1747301100.570:752): avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.648757 kernel: Failed to create system directory fscache May 15 09:25:00.570000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.660496 kernel: audit: type=1300 audit(1747301100.570:752): arch=c000003e syscall=175 success=yes exit=0 a0=56239ddf85e0 a1=153bc a2=56237a22d2b0 a3=5 items=0 ppid=466 pid=3030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:25:00.660576 kernel: Failed to create system directory fscache May 15 09:25:00.570000 audit[3030]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56239ddf85e0 a1=153bc a2=56237a22d2b0 a3=5 items=0 ppid=466 pid=3030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:25:00.664283 kernel: audit: type=1327 audit(1747301100.570:752): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 15 09:25:00.664384 kernel: Failed to create system directory fscache May 15 09:25:00.570000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 15 09:25:00.670647 kernel: audit: type=1400 audit(1747301100.629:753): avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.670687 kernel: Failed to create system directory fscache May 15 09:25:00.629000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.677004 kernel: audit: type=1400 audit(1747301100.629:753): avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.677043 kernel: Failed to create system directory fscache May 15 09:25:00.629000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.683370 kernel: audit: type=1400 audit(1747301100.629:753): avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.683430 kernel: Failed to create system directory fscache May 15 09:25:00.629000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.689695 kernel: audit: type=1400 audit(1747301100.629:753): avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.689752 kernel: Failed to create system directory fscache May 15 09:25:00.629000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.629000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.629000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.629000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.629000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.691122 kernel: Failed to create system directory fscache May 15 09:25:00.629000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.629000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.693744 kernel: Failed to create system directory fscache May 15 09:25:00.629000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.695651 kernel: Failed to create system directory fscache May 15 09:25:00.695695 kernel: Failed to create system directory fscache May 15 09:25:00.629000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.629000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.700563 kernel: Failed to create system directory fscache May 15 09:25:00.629000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.702196 kernel: Failed to create system directory fscache May 15 09:25:00.706158 kernel: FS-Cache: Loaded May 15 09:25:00.629000 audit[3030]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56239e00d9c0 a1=4c0fc a2=56237a22d2b0 a3=5 items=0 ppid=466 pid=3030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:25:00.629000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 15 09:25:00.719728 kubelet[1454]: E0515 09:25:00.719699 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.755982 kernel: Failed to create system directory sunrpc May 15 09:25:00.756055 kernel: Failed to create system directory sunrpc May 15 09:25:00.756119 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.758532 kernel: Failed to create system directory sunrpc May 15 09:25:00.758579 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.761042 kernel: Failed to create system directory sunrpc May 15 09:25:00.761137 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.763672 kernel: Failed to create system directory sunrpc May 15 09:25:00.763720 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.766319 kernel: Failed to create system directory sunrpc May 15 09:25:00.766377 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.768826 kernel: Failed to create system directory sunrpc May 15 09:25:00.768881 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.771452 kernel: Failed to create system directory sunrpc May 15 09:25:00.771506 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.774047 kernel: Failed to create system directory sunrpc May 15 09:25:00.774107 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.776491 kernel: Failed to create system directory sunrpc May 15 09:25:00.776576 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.779015 kernel: Failed to create system directory sunrpc May 15 09:25:00.779073 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.781540 kernel: Failed to create system directory sunrpc May 15 09:25:00.781599 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.784056 kernel: Failed to create system directory sunrpc May 15 09:25:00.784151 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.786772 kernel: Failed to create system directory sunrpc May 15 09:25:00.786814 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.789356 kernel: Failed to create system directory sunrpc May 15 09:25:00.789438 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.791958 kernel: Failed to create system directory sunrpc May 15 09:25:00.792012 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.794566 kernel: Failed to create system directory sunrpc May 15 09:25:00.794609 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.797152 kernel: Failed to create system directory sunrpc May 15 09:25:00.797198 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.799694 kernel: Failed to create system directory sunrpc May 15 09:25:00.799775 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.800966 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.802321 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.804764 kernel: Failed to create system directory sunrpc May 15 09:25:00.804807 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.807278 kernel: Failed to create system directory sunrpc May 15 09:25:00.807319 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.808476 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.809766 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.811030 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.812368 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.814972 kernel: Failed to create system directory sunrpc May 15 09:25:00.815016 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.816242 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.817583 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.820162 kernel: Failed to create system directory sunrpc May 15 09:25:00.820214 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.822761 kernel: Failed to create system directory sunrpc May 15 09:25:00.822795 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.823930 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.825214 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.827849 kernel: Failed to create system directory sunrpc May 15 09:25:00.827901 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.829173 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.831702 kernel: Failed to create system directory sunrpc May 15 09:25:00.831744 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.832872 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.834158 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.836703 kernel: Failed to create system directory sunrpc May 15 09:25:00.836754 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.837962 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.839305 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.840508 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.841755 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.843036 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.845541 kernel: Failed to create system directory sunrpc May 15 09:25:00.845652 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.846877 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.849487 kernel: Failed to create system directory sunrpc May 15 09:25:00.849529 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.852006 kernel: Failed to create system directory sunrpc May 15 09:25:00.852057 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.854666 kernel: Failed to create system directory sunrpc May 15 09:25:00.854713 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.857241 kernel: Failed to create system directory sunrpc May 15 09:25:00.857294 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.859867 kernel: Failed to create system directory sunrpc May 15 09:25:00.859922 kernel: Failed to create system directory sunrpc May 15 09:25:00.866580 kernel: Failed to create system directory sunrpc May 15 09:25:00.866621 kernel: Failed to create system directory sunrpc May 15 09:25:00.866662 kernel: Failed to create system directory sunrpc May 15 09:25:00.866708 kernel: Failed to create system directory sunrpc May 15 09:25:00.866762 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.869193 kernel: Failed to create system directory sunrpc May 15 09:25:00.869236 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.871826 kernel: Failed to create system directory sunrpc May 15 09:25:00.871877 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.873167 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.875733 kernel: Failed to create system directory sunrpc May 15 09:25:00.875775 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.876912 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.878266 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.880898 kernel: Failed to create system directory sunrpc May 15 09:25:00.880948 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.883564 kernel: Failed to create system directory sunrpc May 15 09:25:00.883608 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.886224 kernel: Failed to create system directory sunrpc May 15 09:25:00.886276 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.888961 kernel: Failed to create system directory sunrpc May 15 09:25:00.889190 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.891545 kernel: Failed to create system directory sunrpc May 15 09:25:00.891782 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.892686 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.894065 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.896717 kernel: Failed to create system directory sunrpc May 15 09:25:00.896887 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.897945 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.899340 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.901999 kernel: Failed to create system directory sunrpc May 15 09:25:00.902186 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.904595 kernel: Failed to create system directory sunrpc May 15 09:25:00.904735 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.907213 kernel: Failed to create system directory sunrpc May 15 09:25:00.907370 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.909781 kernel: Failed to create system directory sunrpc May 15 09:25:00.909906 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.912414 kernel: Failed to create system directory sunrpc May 15 09:25:00.912630 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.913660 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.914981 kernel: Failed to create system directory sunrpc May 15 09:25:00.736000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.930938 kernel: RPC: Registered named UNIX socket transport module. May 15 09:25:00.931386 kernel: RPC: Registered udp transport module. May 15 09:25:00.931768 kernel: RPC: Registered tcp transport module. May 15 09:25:00.932045 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. May 15 09:25:00.736000 audit[3030]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56239e059ad0 a1=1a814c a2=56237a22d2b0 a3=5 items=6 ppid=466 pid=3030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:25:00.736000 audit: CWD cwd="/" May 15 09:25:00.736000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:25:00.736000 audit: PATH item=1 name=(null) inode=23006 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:25:00.736000 audit: PATH item=2 name=(null) inode=23006 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:25:00.736000 audit: PATH item=3 name=(null) inode=23007 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:25:00.736000 audit: PATH item=4 name=(null) inode=23006 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:25:00.736000 audit: PATH item=5 name=(null) inode=23008 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:25:00.736000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.987182 kernel: Failed to create system directory nfs May 15 09:25:00.987405 kernel: Failed to create system directory nfs May 15 09:25:00.987475 kernel: Failed to create system directory nfs May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.989790 kernel: Failed to create system directory nfs May 15 09:25:00.989957 kernel: Failed to create system directory nfs May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.991164 kernel: Failed to create system directory nfs May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.993474 kernel: Failed to create system directory nfs May 15 09:25:00.993674 kernel: Failed to create system directory nfs May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.996033 kernel: Failed to create system directory nfs May 15 09:25:00.996181 kernel: Failed to create system directory nfs May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.998451 kernel: Failed to create system directory nfs May 15 09:25:00.998554 kernel: Failed to create system directory nfs May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.000996 kernel: Failed to create system directory nfs May 15 09:25:01.001171 kernel: Failed to create system directory nfs May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.003474 kernel: Failed to create system directory nfs May 15 09:25:01.003673 kernel: Failed to create system directory nfs May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.004797 kernel: Failed to create system directory nfs May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.007275 kernel: Failed to create system directory nfs May 15 09:25:01.007379 kernel: Failed to create system directory nfs May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.014050 kernel: Failed to create system directory nfs May 15 09:25:01.014202 kernel: Failed to create system directory nfs May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.015184 kernel: Failed to create system directory nfs May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.016558 kernel: Failed to create system directory nfs May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.019171 kernel: Failed to create system directory nfs May 15 09:25:01.019395 kernel: Failed to create system directory nfs May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.021685 kernel: Failed to create system directory nfs May 15 09:25:01.021958 kernel: Failed to create system directory nfs May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.022930 kernel: Failed to create system directory nfs May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.024321 kernel: Failed to create system directory nfs May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.026811 kernel: Failed to create system directory nfs May 15 09:25:01.026968 kernel: Failed to create system directory nfs May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.029349 kernel: Failed to create system directory nfs May 15 09:25:01.029487 kernel: Failed to create system directory nfs May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.031905 kernel: Failed to create system directory nfs May 15 09:25:01.032066 kernel: Failed to create system directory nfs May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.034527 kernel: Failed to create system directory nfs May 15 09:25:01.034667 kernel: Failed to create system directory nfs May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.037023 kernel: Failed to create system directory nfs May 15 09:25:01.037331 kernel: Failed to create system directory nfs May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.039675 kernel: Failed to create system directory nfs May 15 09:25:01.039987 kernel: Failed to create system directory nfs May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.042257 kernel: Failed to create system directory nfs May 15 09:25:01.042481 kernel: Failed to create system directory nfs May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.044741 kernel: Failed to create system directory nfs May 15 09:25:01.044905 kernel: Failed to create system directory nfs May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.045782 kernel: Failed to create system directory nfs May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.047166 kernel: Failed to create system directory nfs May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.049691 kernel: Failed to create system directory nfs May 15 09:25:01.049829 kernel: Failed to create system directory nfs May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.052256 kernel: Failed to create system directory nfs May 15 09:25:01.052411 kernel: Failed to create system directory nfs May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.054778 kernel: Failed to create system directory nfs May 15 09:25:01.055000 kernel: Failed to create system directory nfs May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.056030 kernel: Failed to create system directory nfs May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.057347 kernel: Failed to create system directory nfs May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.059903 kernel: Failed to create system directory nfs May 15 09:25:01.060071 kernel: Failed to create system directory nfs May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.062474 kernel: Failed to create system directory nfs May 15 09:25:01.062739 kernel: Failed to create system directory nfs May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:00.972000 audit[3030]: AVC avc: denied { confidentiality } for pid=3030 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.065305 kernel: Failed to create system directory nfs May 15 09:25:01.092607 kernel: FS-Cache: Netfs 'nfs' registered for caching May 15 09:25:00.972000 audit[3030]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56239e27aa10 a1=16eae4 a2=56237a22d2b0 a3=5 items=0 ppid=466 pid=3030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:25:00.972000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.153037 kernel: Failed to create system directory nfs4 May 15 09:25:01.153272 kernel: Failed to create system directory nfs4 May 15 09:25:01.153342 kernel: Failed to create system directory nfs4 May 15 09:25:01.153392 kernel: Failed to create system directory nfs4 May 15 09:25:01.153435 kernel: Failed to create system directory nfs4 May 15 09:25:01.153509 kernel: Failed to create system directory nfs4 May 15 09:25:01.153557 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.154526 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.155479 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.156762 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.158042 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.159334 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.160620 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.161837 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.163267 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.165794 kernel: Failed to create system directory nfs4 May 15 09:25:01.166024 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.168425 kernel: Failed to create system directory nfs4 May 15 09:25:01.168581 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.170987 kernel: Failed to create system directory nfs4 May 15 09:25:01.171174 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.172286 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.173466 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.174893 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.175997 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.177261 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.178475 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.179781 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.181004 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.182284 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.183411 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.184712 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.186058 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.187314 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.188359 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.189750 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.190965 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.192299 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.193393 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.194743 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.195932 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.197188 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.198312 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.199455 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.200823 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.202138 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.203249 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.204635 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.205654 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.207001 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.208274 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.209409 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.210771 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.211941 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.213294 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.214327 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.215619 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.216807 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.218214 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.219360 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.220724 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.221892 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.223197 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.224410 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.226992 kernel: Failed to create system directory nfs4 May 15 09:25:01.227149 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.228288 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.229476 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.230832 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.233371 kernel: Failed to create system directory nfs4 May 15 09:25:01.233506 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.234584 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.235853 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.237471 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.241552 kernel: Failed to create system directory nfs4 May 15 09:25:01.242821 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.249615 kernel: Failed to create system directory nfs4 May 15 09:25:01.249992 kernel: Failed to create system directory nfs4 May 15 09:25:01.250058 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.254473 kernel: Failed to create system directory nfs4 May 15 09:25:01.254652 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.257552 kernel: Failed to create system directory nfs4 May 15 09:25:01.257770 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.260290 kernel: Failed to create system directory nfs4 May 15 09:25:01.260532 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.262694 kernel: Failed to create system directory nfs4 May 15 09:25:01.262812 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.264129 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.268865 kernel: Failed to create system directory nfs4 May 15 09:25:01.278083 kernel: Failed to create system directory nfs4 May 15 09:25:01.278235 kernel: Failed to create system directory nfs4 May 15 09:25:01.278313 kernel: Failed to create system directory nfs4 May 15 09:25:01.278368 kernel: Failed to create system directory nfs4 May 15 09:25:01.278492 kernel: Failed to create system directory nfs4 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.126000 audit[3035]: AVC avc: denied { confidentiality } for pid=3035 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.344518 systemd[1]: run-containerd-runc-k8s.io-510b7b4b34943d1cd869d43d910bfc933779687617be8470379f6d816c781ba4-runc.WkgCGh.mount: Deactivated successfully. May 15 09:25:01.468782 kernel: NFS: Registering the id_resolver key type May 15 09:25:01.468924 kernel: Key type id_resolver registered May 15 09:25:01.468966 kernel: Key type id_legacy registered May 15 09:25:01.126000 audit[3035]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7ff51b40a010 a1=209404 a2=55c51e45a2b0 a3=5 items=0 ppid=466 pid=3035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:25:01.126000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 May 15 09:25:01.481000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.481000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.489059 kernel: Failed to create system directory rpcgss May 15 09:25:01.489122 kernel: Failed to create system directory rpcgss May 15 09:25:01.489175 kernel: Failed to create system directory rpcgss May 15 09:25:01.481000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.481000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.491708 kernel: Failed to create system directory rpcgss May 15 09:25:01.491759 kernel: Failed to create system directory rpcgss May 15 09:25:01.481000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.481000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.494195 kernel: Failed to create system directory rpcgss May 15 09:25:01.494287 kernel: Failed to create system directory rpcgss May 15 09:25:01.481000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.495480 kernel: Failed to create system directory rpcgss May 15 09:25:01.481000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.496746 kernel: Failed to create system directory rpcgss May 15 09:25:01.481000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.497972 kernel: Failed to create system directory rpcgss May 15 09:25:01.481000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.499257 kernel: Failed to create system directory rpcgss May 15 09:25:01.481000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.500628 kernel: Failed to create system directory rpcgss May 15 09:25:01.481000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.501964 kernel: Failed to create system directory rpcgss May 15 09:25:01.481000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.503317 kernel: Failed to create system directory rpcgss May 15 09:25:01.481000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.481000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.505886 kernel: Failed to create system directory rpcgss May 15 09:25:01.505921 kernel: Failed to create system directory rpcgss May 15 09:25:01.481000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.507183 kernel: Failed to create system directory rpcgss May 15 09:25:01.481000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.508524 kernel: Failed to create system directory rpcgss May 15 09:25:01.481000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.481000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.511373 kernel: Failed to create system directory rpcgss May 15 09:25:01.511514 kernel: Failed to create system directory rpcgss May 15 09:25:01.481000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.512350 kernel: Failed to create system directory rpcgss May 15 09:25:01.481000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.513597 kernel: Failed to create system directory rpcgss May 15 09:25:01.481000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.514833 kernel: Failed to create system directory rpcgss May 15 09:25:01.481000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.516184 kernel: Failed to create system directory rpcgss May 15 09:25:01.481000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.517481 kernel: Failed to create system directory rpcgss May 15 09:25:01.481000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.518699 kernel: Failed to create system directory rpcgss May 15 09:25:01.481000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:25:01.481000 audit[3056]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fb479263010 a1=70b64 a2=55a51a7632b0 a3=5 items=0 ppid=466 pid=3056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:25:01.481000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 May 15 09:25:01.563228 nfsidmap[3063]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'novalocal' May 15 09:25:01.571456 nfsidmap[3064]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'novalocal' May 15 09:25:01.582000 audit[1219]: AVC avc: denied { watch_reads } for pid=1219 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2537 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 15 09:25:01.582000 audit[1219]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=556cd8b4d330 a2=10 a3=bd9a3497707f2606 items=0 ppid=1 pid=1219 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:25:01.582000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 15 09:25:01.582000 audit[1219]: AVC avc: denied { watch_reads } for pid=1219 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2537 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 15 09:25:01.582000 audit[1219]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=556cd8b4d330 a2=10 a3=bd9a3497707f2606 items=0 ppid=1 pid=1219 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:25:01.582000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 15 09:25:01.582000 audit[1219]: AVC avc: denied { watch_reads } for pid=1219 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2537 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 15 09:25:01.582000 audit[1219]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=556cd8b4d330 a2=10 a3=bd9a3497707f2606 items=0 ppid=1 pid=1219 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:25:01.582000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 15 09:25:01.586000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2537 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 15 09:25:01.586000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2537 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 15 09:25:01.586000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2537 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 15 09:25:01.720630 kubelet[1454]: E0515 09:25:01.720404 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:01.827509 env[1150]: time="2025-05-15T09:25:01.827343432Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:6a9209cb-e400-4609-a802-dab0d18975ed,Namespace:default,Attempt:0,}" May 15 09:25:02.188625 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 09:25:02.188881 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready May 15 09:25:02.189398 systemd-networkd[986]: cali5ec59c6bf6e: Link UP May 15 09:25:02.191639 systemd-networkd[986]: cali5ec59c6bf6e: Gained carrier May 15 09:25:02.213978 env[1150]: 2025-05-15 09:25:01.971 [INFO][3066] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.111-k8s-test--pod--1-eth0 default 6a9209cb-e400-4609-a802-dab0d18975ed 1570 0 2025-05-15 09:24:28 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.24.4.111 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="09bee78e1206bfa16c43081faf0e2ee6f659703a1010ed190544aefbf257a77f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.111-k8s-test--pod--1-" May 15 09:25:02.213978 env[1150]: 2025-05-15 09:25:01.971 [INFO][3066] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="09bee78e1206bfa16c43081faf0e2ee6f659703a1010ed190544aefbf257a77f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.111-k8s-test--pod--1-eth0" May 15 09:25:02.213978 env[1150]: 2025-05-15 09:25:02.068 [INFO][3078] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="09bee78e1206bfa16c43081faf0e2ee6f659703a1010ed190544aefbf257a77f" HandleID="k8s-pod-network.09bee78e1206bfa16c43081faf0e2ee6f659703a1010ed190544aefbf257a77f" Workload="172.24.4.111-k8s-test--pod--1-eth0" May 15 09:25:02.213978 env[1150]: 2025-05-15 09:25:02.095 [INFO][3078] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="09bee78e1206bfa16c43081faf0e2ee6f659703a1010ed190544aefbf257a77f" HandleID="k8s-pod-network.09bee78e1206bfa16c43081faf0e2ee6f659703a1010ed190544aefbf257a77f" Workload="172.24.4.111-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000050b00), Attrs:map[string]string{"namespace":"default", "node":"172.24.4.111", "pod":"test-pod-1", "timestamp":"2025-05-15 09:25:02.068742705 +0000 UTC"}, Hostname:"172.24.4.111", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 09:25:02.213978 env[1150]: 2025-05-15 09:25:02.095 [INFO][3078] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 09:25:02.213978 env[1150]: 2025-05-15 09:25:02.095 [INFO][3078] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 09:25:02.213978 env[1150]: 2025-05-15 09:25:02.096 [INFO][3078] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.111' May 15 09:25:02.213978 env[1150]: 2025-05-15 09:25:02.103 [INFO][3078] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.09bee78e1206bfa16c43081faf0e2ee6f659703a1010ed190544aefbf257a77f" host="172.24.4.111" May 15 09:25:02.213978 env[1150]: 2025-05-15 09:25:02.113 [INFO][3078] ipam/ipam.go 372: Looking up existing affinities for host host="172.24.4.111" May 15 09:25:02.213978 env[1150]: 2025-05-15 09:25:02.123 [INFO][3078] ipam/ipam.go 489: Trying affinity for 192.168.20.192/26 host="172.24.4.111" May 15 09:25:02.213978 env[1150]: 2025-05-15 09:25:02.126 [INFO][3078] ipam/ipam.go 155: Attempting to load block cidr=192.168.20.192/26 host="172.24.4.111" May 15 09:25:02.213978 env[1150]: 2025-05-15 09:25:02.132 [INFO][3078] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.20.192/26 host="172.24.4.111" May 15 09:25:02.213978 env[1150]: 2025-05-15 09:25:02.132 [INFO][3078] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.20.192/26 handle="k8s-pod-network.09bee78e1206bfa16c43081faf0e2ee6f659703a1010ed190544aefbf257a77f" host="172.24.4.111" May 15 09:25:02.213978 env[1150]: 2025-05-15 09:25:02.136 [INFO][3078] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.09bee78e1206bfa16c43081faf0e2ee6f659703a1010ed190544aefbf257a77f May 15 09:25:02.213978 env[1150]: 2025-05-15 09:25:02.144 [INFO][3078] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.20.192/26 handle="k8s-pod-network.09bee78e1206bfa16c43081faf0e2ee6f659703a1010ed190544aefbf257a77f" host="172.24.4.111" May 15 09:25:02.213978 env[1150]: 2025-05-15 09:25:02.162 [INFO][3078] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.20.196/26] block=192.168.20.192/26 handle="k8s-pod-network.09bee78e1206bfa16c43081faf0e2ee6f659703a1010ed190544aefbf257a77f" host="172.24.4.111" May 15 09:25:02.213978 env[1150]: 2025-05-15 09:25:02.162 [INFO][3078] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.20.196/26] handle="k8s-pod-network.09bee78e1206bfa16c43081faf0e2ee6f659703a1010ed190544aefbf257a77f" host="172.24.4.111" May 15 09:25:02.213978 env[1150]: 2025-05-15 09:25:02.162 [INFO][3078] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 09:25:02.213978 env[1150]: 2025-05-15 09:25:02.162 [INFO][3078] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.20.196/26] IPv6=[] ContainerID="09bee78e1206bfa16c43081faf0e2ee6f659703a1010ed190544aefbf257a77f" HandleID="k8s-pod-network.09bee78e1206bfa16c43081faf0e2ee6f659703a1010ed190544aefbf257a77f" Workload="172.24.4.111-k8s-test--pod--1-eth0" May 15 09:25:02.213978 env[1150]: 2025-05-15 09:25:02.167 [INFO][3066] cni-plugin/k8s.go 386: Populated endpoint ContainerID="09bee78e1206bfa16c43081faf0e2ee6f659703a1010ed190544aefbf257a77f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.111-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.111-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"6a9209cb-e400-4609-a802-dab0d18975ed", ResourceVersion:"1570", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 9, 24, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.111", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.20.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 09:25:02.216380 env[1150]: 2025-05-15 09:25:02.167 [INFO][3066] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.20.196/32] ContainerID="09bee78e1206bfa16c43081faf0e2ee6f659703a1010ed190544aefbf257a77f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.111-k8s-test--pod--1-eth0" May 15 09:25:02.216380 env[1150]: 2025-05-15 09:25:02.167 [INFO][3066] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="09bee78e1206bfa16c43081faf0e2ee6f659703a1010ed190544aefbf257a77f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.111-k8s-test--pod--1-eth0" May 15 09:25:02.216380 env[1150]: 2025-05-15 09:25:02.193 [INFO][3066] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="09bee78e1206bfa16c43081faf0e2ee6f659703a1010ed190544aefbf257a77f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.111-k8s-test--pod--1-eth0" May 15 09:25:02.216380 env[1150]: 2025-05-15 09:25:02.195 [INFO][3066] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="09bee78e1206bfa16c43081faf0e2ee6f659703a1010ed190544aefbf257a77f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.111-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.111-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"6a9209cb-e400-4609-a802-dab0d18975ed", ResourceVersion:"1570", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 9, 24, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.111", ContainerID:"09bee78e1206bfa16c43081faf0e2ee6f659703a1010ed190544aefbf257a77f", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.20.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"f2:30:f4:0b:a2:b8", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 09:25:02.216380 env[1150]: 2025-05-15 09:25:02.208 [INFO][3066] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="09bee78e1206bfa16c43081faf0e2ee6f659703a1010ed190544aefbf257a77f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.111-k8s-test--pod--1-eth0" May 15 09:25:02.247000 audit[3099]: NETFILTER_CFG table=filter:78 family=2 entries=38 op=nft_register_chain pid=3099 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 09:25:02.247000 audit[3099]: SYSCALL arch=c000003e syscall=46 success=yes exit=19400 a0=3 a1=7fff3fe58c40 a2=0 a3=7fff3fe58c2c items=0 ppid=2191 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:25:02.247000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 09:25:02.259427 env[1150]: time="2025-05-15T09:25:02.259241062Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 09:25:02.259427 env[1150]: time="2025-05-15T09:25:02.259365108Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 09:25:02.259827 env[1150]: time="2025-05-15T09:25:02.259748605Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 09:25:02.260579 env[1150]: time="2025-05-15T09:25:02.260407456Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/09bee78e1206bfa16c43081faf0e2ee6f659703a1010ed190544aefbf257a77f pid=3107 runtime=io.containerd.runc.v2 May 15 09:25:02.295848 systemd[1]: Started cri-containerd-09bee78e1206bfa16c43081faf0e2ee6f659703a1010ed190544aefbf257a77f.scope. May 15 09:25:02.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:02.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:02.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:02.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:02.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:02.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:02.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:02.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:02.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:02.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:02.310000 audit: BPF prog-id=123 op=LOAD May 15 09:25:02.311000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:02.311000 audit[3117]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3107 pid=3117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:25:02.311000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039626565373865313230366266613136633433303831666166306532 May 15 09:25:02.311000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:02.311000 audit[3117]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=3107 pid=3117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:25:02.311000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039626565373865313230366266613136633433303831666166306532 May 15 09:25:02.312000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:02.312000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:02.312000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:02.312000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:02.312000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:02.312000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:02.312000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:02.312000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:02.312000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:02.312000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:02.312000 audit: BPF prog-id=124 op=LOAD May 15 09:25:02.312000 audit[3117]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c000199200 items=0 ppid=3107 pid=3117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:25:02.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039626565373865313230366266613136633433303831666166306532 May 15 09:25:02.313000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:02.313000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:02.313000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:02.313000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:02.313000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:02.313000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:02.313000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:02.313000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:02.313000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:02.313000 audit: BPF prog-id=125 op=LOAD May 15 09:25:02.313000 audit[3117]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c000199248 items=0 ppid=3107 pid=3117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:25:02.313000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039626565373865313230366266613136633433303831666166306532 May 15 09:25:02.313000 audit: BPF prog-id=125 op=UNLOAD May 15 09:25:02.313000 audit: BPF prog-id=124 op=UNLOAD May 15 09:25:02.313000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:02.313000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:02.313000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:02.313000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:02.313000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:02.313000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:02.313000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:02.313000 audit[3117]: AVC avc: denied { perfmon } for pid=3117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:02.313000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:02.313000 audit[3117]: AVC avc: denied { bpf } for pid=3117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:02.313000 audit: BPF prog-id=126 op=LOAD May 15 09:25:02.313000 audit[3117]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c000199658 items=0 ppid=3107 pid=3117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:25:02.313000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039626565373865313230366266613136633433303831666166306532 May 15 09:25:02.344071 env[1150]: time="2025-05-15T09:25:02.344014687Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:6a9209cb-e400-4609-a802-dab0d18975ed,Namespace:default,Attempt:0,} returns sandbox id \"09bee78e1206bfa16c43081faf0e2ee6f659703a1010ed190544aefbf257a77f\"" May 15 09:25:02.346550 env[1150]: time="2025-05-15T09:25:02.346522356Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 15 09:25:02.722925 kubelet[1454]: E0515 09:25:02.722723 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:02.896261 env[1150]: time="2025-05-15T09:25:02.896150443Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:25:02.900562 env[1150]: time="2025-05-15T09:25:02.900480580Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:25:02.905812 env[1150]: time="2025-05-15T09:25:02.905717578Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:25:02.910657 env[1150]: time="2025-05-15T09:25:02.910593001Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:25:02.912764 env[1150]: time="2025-05-15T09:25:02.912696162Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa\"" May 15 09:25:02.919786 env[1150]: time="2025-05-15T09:25:02.919676238Z" level=info msg="CreateContainer within sandbox \"09bee78e1206bfa16c43081faf0e2ee6f659703a1010ed190544aefbf257a77f\" for container &ContainerMetadata{Name:test,Attempt:0,}" May 15 09:25:02.942177 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3040620761.mount: Deactivated successfully. May 15 09:25:02.951605 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2546114663.mount: Deactivated successfully. May 15 09:25:02.959340 env[1150]: time="2025-05-15T09:25:02.959275775Z" level=info msg="CreateContainer within sandbox \"09bee78e1206bfa16c43081faf0e2ee6f659703a1010ed190544aefbf257a77f\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"74de29c8399fd90eac39bd1f207514aa4a0762eba6ad984ddeab93c4b0af7800\"" May 15 09:25:02.960386 env[1150]: time="2025-05-15T09:25:02.960327792Z" level=info msg="StartContainer for \"74de29c8399fd90eac39bd1f207514aa4a0762eba6ad984ddeab93c4b0af7800\"" May 15 09:25:02.984485 systemd[1]: Started cri-containerd-74de29c8399fd90eac39bd1f207514aa4a0762eba6ad984ddeab93c4b0af7800.scope. May 15 09:25:03.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:03.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:03.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:03.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:03.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:03.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:03.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:03.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:03.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:03.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:03.007000 audit: BPF prog-id=127 op=LOAD May 15 09:25:03.008000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:03.008000 audit[3147]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3107 pid=3147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:25:03.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734646532396338333939666439306561633339626431663230373531 May 15 09:25:03.008000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:03.008000 audit[3147]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3107 pid=3147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:25:03.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734646532396338333939666439306561633339626431663230373531 May 15 09:25:03.009000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:03.009000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:03.009000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:03.009000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:03.009000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:03.009000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:03.009000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:03.009000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:03.009000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:03.009000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:03.009000 audit: BPF prog-id=128 op=LOAD May 15 09:25:03.009000 audit[3147]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00032f130 items=0 ppid=3107 pid=3147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:25:03.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734646532396338333939666439306561633339626431663230373531 May 15 09:25:03.010000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:03.010000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:03.010000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:03.010000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:03.010000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:03.010000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:03.010000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:03.010000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:03.010000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:03.010000 audit: BPF prog-id=129 op=LOAD May 15 09:25:03.010000 audit[3147]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00032f178 items=0 ppid=3107 pid=3147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:25:03.010000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734646532396338333939666439306561633339626431663230373531 May 15 09:25:03.010000 audit: BPF prog-id=129 op=UNLOAD May 15 09:25:03.010000 audit: BPF prog-id=128 op=UNLOAD May 15 09:25:03.011000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:03.011000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:03.011000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:03.011000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:03.011000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:03.011000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:03.011000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:03.011000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:03.011000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:03.011000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:25:03.011000 audit: BPF prog-id=130 op=LOAD May 15 09:25:03.011000 audit[3147]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00032f588 items=0 ppid=3107 pid=3147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:25:03.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734646532396338333939666439306561633339626431663230373531 May 15 09:25:03.034619 env[1150]: time="2025-05-15T09:25:03.034555136Z" level=info msg="StartContainer for \"74de29c8399fd90eac39bd1f207514aa4a0762eba6ad984ddeab93c4b0af7800\" returns successfully" May 15 09:25:03.617827 kubelet[1454]: I0515 09:25:03.617626 1454 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=35.047154604 podStartE2EDuration="35.617547766s" podCreationTimestamp="2025-05-15 09:24:28 +0000 UTC" firstStartedPulling="2025-05-15 09:25:02.346016877 +0000 UTC m=+93.598850799" lastFinishedPulling="2025-05-15 09:25:02.916409999 +0000 UTC m=+94.169243961" observedRunningTime="2025-05-15 09:25:03.616751305 +0000 UTC m=+94.869585278" watchObservedRunningTime="2025-05-15 09:25:03.617547766 +0000 UTC m=+94.870381728" May 15 09:25:03.723931 kubelet[1454]: E0515 09:25:03.723846 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:04.022929 systemd-networkd[986]: cali5ec59c6bf6e: Gained IPv6LL May 15 09:25:04.725248 kubelet[1454]: E0515 09:25:04.725029 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:05.727443 kubelet[1454]: E0515 09:25:05.727366 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:06.729083 kubelet[1454]: E0515 09:25:06.729011 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:07.731422 kubelet[1454]: E0515 09:25:07.731285 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:08.732129 kubelet[1454]: E0515 09:25:08.732027 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:09.585611 kubelet[1454]: E0515 09:25:09.585540 1454 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:09.733901 kubelet[1454]: E0515 09:25:09.733829 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:10.734437 kubelet[1454]: E0515 09:25:10.734370 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:11.735952 kubelet[1454]: E0515 09:25:11.735847 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:12.736716 kubelet[1454]: E0515 09:25:12.736567 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:13.736917 kubelet[1454]: E0515 09:25:13.736751 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:14.737710 kubelet[1454]: E0515 09:25:14.737612 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:15.738732 kubelet[1454]: E0515 09:25:15.738641 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:16.739378 kubelet[1454]: E0515 09:25:16.739310 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:17.740798 kubelet[1454]: E0515 09:25:17.740728 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:18.743151 kubelet[1454]: E0515 09:25:18.743039 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:19.744191 kubelet[1454]: E0515 09:25:19.744062 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:20.745212 kubelet[1454]: E0515 09:25:20.745081 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:21.745982 kubelet[1454]: E0515 09:25:21.745883 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:22.746914 kubelet[1454]: E0515 09:25:22.746844 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:23.747209 kubelet[1454]: E0515 09:25:23.747134 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:24.748317 kubelet[1454]: E0515 09:25:24.748195 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:25.748579 kubelet[1454]: E0515 09:25:25.748393 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:26.748783 kubelet[1454]: E0515 09:25:26.748721 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:27.750453 kubelet[1454]: E0515 09:25:27.750298 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:28.751364 kubelet[1454]: E0515 09:25:28.751233 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:29.585638 kubelet[1454]: E0515 09:25:29.585523 1454 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:29.752779 kubelet[1454]: E0515 09:25:29.752686 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:30.753623 kubelet[1454]: E0515 09:25:30.753426 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:31.317996 systemd[1]: run-containerd-runc-k8s.io-510b7b4b34943d1cd869d43d910bfc933779687617be8470379f6d816c781ba4-runc.SnOfB8.mount: Deactivated successfully. May 15 09:25:31.753801 kubelet[1454]: E0515 09:25:31.753700 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:32.755031 kubelet[1454]: E0515 09:25:32.754935 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:33.757148 kubelet[1454]: E0515 09:25:33.757009 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:34.758118 kubelet[1454]: E0515 09:25:34.757989 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:35.759259 kubelet[1454]: E0515 09:25:35.759186 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:36.761204 kubelet[1454]: E0515 09:25:36.761081 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:37.761928 kubelet[1454]: E0515 09:25:37.761812 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:38.762333 kubelet[1454]: E0515 09:25:38.762199 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:39.762519 kubelet[1454]: E0515 09:25:39.762382 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:40.763459 kubelet[1454]: E0515 09:25:40.763394 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:41.764740 kubelet[1454]: E0515 09:25:41.764641 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:42.765356 kubelet[1454]: E0515 09:25:42.765274 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:43.767408 kubelet[1454]: E0515 09:25:43.767341 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:44.769118 kubelet[1454]: E0515 09:25:44.769001 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:45.769361 kubelet[1454]: E0515 09:25:45.769220 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:46.769852 kubelet[1454]: E0515 09:25:46.769774 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:47.770767 kubelet[1454]: E0515 09:25:47.770578 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:48.771351 kubelet[1454]: E0515 09:25:48.771240 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:49.585460 kubelet[1454]: E0515 09:25:49.585333 1454 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:49.771496 kubelet[1454]: E0515 09:25:49.771438 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:50.772318 kubelet[1454]: E0515 09:25:50.772198 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:51.773587 kubelet[1454]: E0515 09:25:51.773515 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:52.775217 kubelet[1454]: E0515 09:25:52.775000 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:53.775507 kubelet[1454]: E0515 09:25:53.775376 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:54.776618 kubelet[1454]: E0515 09:25:54.776311 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:55.776855 kubelet[1454]: E0515 09:25:55.776762 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:56.778029 kubelet[1454]: E0515 09:25:56.777817 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:57.778287 kubelet[1454]: E0515 09:25:57.778202 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:58.779245 kubelet[1454]: E0515 09:25:58.779185 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:25:59.781190 kubelet[1454]: E0515 09:25:59.781045 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:00.781457 kubelet[1454]: E0515 09:26:00.781363 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:01.348859 systemd[1]: run-containerd-runc-k8s.io-510b7b4b34943d1cd869d43d910bfc933779687617be8470379f6d816c781ba4-runc.QOl2nT.mount: Deactivated successfully. May 15 09:26:01.781876 kubelet[1454]: E0515 09:26:01.781706 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:02.783885 kubelet[1454]: E0515 09:26:02.783157 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:03.785004 kubelet[1454]: E0515 09:26:03.784951 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:04.786077 kubelet[1454]: E0515 09:26:04.786004 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:05.787725 kubelet[1454]: E0515 09:26:05.787636 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:06.788911 kubelet[1454]: E0515 09:26:06.788814 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:07.789165 kubelet[1454]: E0515 09:26:07.789026 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:08.789726 kubelet[1454]: E0515 09:26:08.789598 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:09.585744 kubelet[1454]: E0515 09:26:09.585617 1454 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:09.790748 kubelet[1454]: E0515 09:26:09.790666 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:10.792229 kubelet[1454]: E0515 09:26:10.792000 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:11.793136 kubelet[1454]: E0515 09:26:11.792996 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:12.793770 kubelet[1454]: E0515 09:26:12.793641 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:13.794536 kubelet[1454]: E0515 09:26:13.794342 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:14.796267 kubelet[1454]: E0515 09:26:14.796081 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:15.798290 kubelet[1454]: E0515 09:26:15.798180 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:16.798853 kubelet[1454]: E0515 09:26:16.798767 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:17.801018 kubelet[1454]: E0515 09:26:17.800927 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:18.801749 kubelet[1454]: E0515 09:26:18.801601 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:19.802277 kubelet[1454]: E0515 09:26:19.802172 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:20.804378 kubelet[1454]: E0515 09:26:20.804301 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:21.805605 kubelet[1454]: E0515 09:26:21.805474 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:22.805966 kubelet[1454]: E0515 09:26:22.805830 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:23.806249 kubelet[1454]: E0515 09:26:23.806161 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:24.807257 kubelet[1454]: E0515 09:26:24.807197 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:25.809349 kubelet[1454]: E0515 09:26:25.809237 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:26.810836 kubelet[1454]: E0515 09:26:26.810729 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:27.812979 kubelet[1454]: E0515 09:26:27.812832 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:28.813769 kubelet[1454]: E0515 09:26:28.813678 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:29.585024 kubelet[1454]: E0515 09:26:29.584938 1454 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:29.814508 kubelet[1454]: E0515 09:26:29.814431 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:30.814936 kubelet[1454]: E0515 09:26:30.814828 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:31.303431 systemd[1]: run-containerd-runc-k8s.io-510b7b4b34943d1cd869d43d910bfc933779687617be8470379f6d816c781ba4-runc.94Ikij.mount: Deactivated successfully. May 15 09:26:31.815589 kubelet[1454]: E0515 09:26:31.815487 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:32.817830 kubelet[1454]: E0515 09:26:32.817755 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:33.819369 kubelet[1454]: E0515 09:26:33.819212 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:34.821168 kubelet[1454]: E0515 09:26:34.821013 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:35.822133 kubelet[1454]: E0515 09:26:35.822037 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:36.822323 kubelet[1454]: E0515 09:26:36.822216 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:37.823001 kubelet[1454]: E0515 09:26:37.822855 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:38.823727 kubelet[1454]: E0515 09:26:38.823628 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:39.824576 kubelet[1454]: E0515 09:26:39.824449 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:40.825391 kubelet[1454]: E0515 09:26:40.825250 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:41.825828 kubelet[1454]: E0515 09:26:41.825767 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:42.828340 kubelet[1454]: E0515 09:26:42.827671 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:43.832704 kubelet[1454]: E0515 09:26:43.832363 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:44.833682 kubelet[1454]: E0515 09:26:44.833585 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:45.833895 kubelet[1454]: E0515 09:26:45.833817 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:46.835024 kubelet[1454]: E0515 09:26:46.834895 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:47.835335 kubelet[1454]: E0515 09:26:47.835210 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:48.836499 kubelet[1454]: E0515 09:26:48.836398 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:49.585229 kubelet[1454]: E0515 09:26:49.585133 1454 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:49.838613 kubelet[1454]: E0515 09:26:49.837359 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:50.839688 kubelet[1454]: E0515 09:26:50.839597 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:51.840587 kubelet[1454]: E0515 09:26:51.840410 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:52.840738 kubelet[1454]: E0515 09:26:52.840657 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:53.842344 kubelet[1454]: E0515 09:26:53.842199 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:54.843573 kubelet[1454]: E0515 09:26:54.843488 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:55.845686 kubelet[1454]: E0515 09:26:55.845246 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:56.846714 kubelet[1454]: E0515 09:26:56.846628 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:57.847486 kubelet[1454]: E0515 09:26:57.847373 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:58.847718 kubelet[1454]: E0515 09:26:58.847624 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:26:59.848492 kubelet[1454]: E0515 09:26:59.848393 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:27:00.850216 kubelet[1454]: E0515 09:27:00.850067 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:27:01.850326 kubelet[1454]: E0515 09:27:01.850237 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:27:02.850638 kubelet[1454]: E0515 09:27:02.850554 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:27:03.851867 kubelet[1454]: E0515 09:27:03.851786 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:27:04.852484 kubelet[1454]: E0515 09:27:04.852403 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:27:05.854009 kubelet[1454]: E0515 09:27:05.853925 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:27:06.855730 kubelet[1454]: E0515 09:27:06.855621 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:27:07.857291 kubelet[1454]: E0515 09:27:07.857142 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:27:08.858223 kubelet[1454]: E0515 09:27:08.858139 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:27:09.585270 kubelet[1454]: E0515 09:27:09.585181 1454 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:27:09.860715 kubelet[1454]: E0515 09:27:09.860051 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:27:10.862817 kubelet[1454]: E0515 09:27:10.861617 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:27:11.863046 kubelet[1454]: E0515 09:27:11.862890 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 09:27:12.863810 kubelet[1454]: E0515 09:27:12.863576 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"