May 17 00:38:24.038326 kernel: Linux version 5.15.182-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri May 16 23:09:52 -00 2025 May 17 00:38:24.038358 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:38:24.038371 kernel: BIOS-provided physical RAM map: May 17 00:38:24.038380 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable May 17 00:38:24.038389 kernel: BIOS-e820: [mem 0x00000000000c0000-0x00000000000fffff] reserved May 17 00:38:24.038398 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003ff40fff] usable May 17 00:38:24.038411 kernel: BIOS-e820: [mem 0x000000003ff41000-0x000000003ffc8fff] reserved May 17 00:38:24.038422 kernel: BIOS-e820: [mem 0x000000003ffc9000-0x000000003fffafff] ACPI data May 17 00:38:24.038431 kernel: BIOS-e820: [mem 0x000000003fffb000-0x000000003fffefff] ACPI NVS May 17 00:38:24.038440 kernel: BIOS-e820: [mem 0x000000003ffff000-0x000000003fffffff] usable May 17 00:38:24.038485 kernel: BIOS-e820: [mem 0x0000000100000000-0x00000002bfffffff] usable May 17 00:38:24.038495 kernel: printk: bootconsole [earlyser0] enabled May 17 00:38:24.038503 kernel: NX (Execute Disable) protection: active May 17 00:38:24.038512 kernel: efi: EFI v2.70 by Microsoft May 17 00:38:24.038527 kernel: efi: ACPI=0x3fffa000 ACPI 2.0=0x3fffa014 SMBIOS=0x3ff85000 SMBIOS 3.0=0x3ff83000 MEMATTR=0x3f5c8a98 RNG=0x3ffd1018 May 17 00:38:24.038538 kernel: random: crng init done May 17 00:38:24.038548 kernel: SMBIOS 3.1.0 present. May 17 00:38:24.038559 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 03/08/2024 May 17 00:38:24.038569 kernel: Hypervisor detected: Microsoft Hyper-V May 17 00:38:24.038579 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3b8030, hints 0x64e24, misc 0xbed7b2 May 17 00:38:24.038590 kernel: Hyper-V Host Build:20348-10.0-1-0.1827 May 17 00:38:24.038600 kernel: Hyper-V: Nested features: 0x1e0101 May 17 00:38:24.038613 kernel: Hyper-V: LAPIC Timer Frequency: 0x30d40 May 17 00:38:24.038623 kernel: Hyper-V: Using hypercall for remote TLB flush May 17 00:38:24.038634 kernel: clocksource: hyperv_clocksource_tsc_page: mask: 0xffffffffffffffff max_cycles: 0x24e6a1710, max_idle_ns: 440795202120 ns May 17 00:38:24.038645 kernel: tsc: Marking TSC unstable due to running on Hyper-V May 17 00:38:24.038657 kernel: tsc: Detected 2593.905 MHz processor May 17 00:38:24.038668 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 17 00:38:24.038680 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 17 00:38:24.038690 kernel: last_pfn = 0x2c0000 max_arch_pfn = 0x400000000 May 17 00:38:24.038700 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 17 00:38:24.038711 kernel: e820: update [mem 0x40000000-0xffffffff] usable ==> reserved May 17 00:38:24.038724 kernel: last_pfn = 0x40000 max_arch_pfn = 0x400000000 May 17 00:38:24.038734 kernel: Using GB pages for direct mapping May 17 00:38:24.038745 kernel: Secure boot disabled May 17 00:38:24.038756 kernel: ACPI: Early table checksum verification disabled May 17 00:38:24.038766 kernel: ACPI: RSDP 0x000000003FFFA014 000024 (v02 VRTUAL) May 17 00:38:24.038777 kernel: ACPI: XSDT 0x000000003FFF90E8 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:38:24.038788 kernel: ACPI: FACP 0x000000003FFF8000 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:38:24.038800 kernel: ACPI: DSDT 0x000000003FFD6000 01E184 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) May 17 00:38:24.038818 kernel: ACPI: FACS 0x000000003FFFE000 000040 May 17 00:38:24.038830 kernel: ACPI: OEM0 0x000000003FFF7000 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:38:24.038842 kernel: ACPI: SPCR 0x000000003FFF6000 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:38:24.038854 kernel: ACPI: WAET 0x000000003FFF5000 000028 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:38:24.038866 kernel: ACPI: APIC 0x000000003FFD5000 000058 (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:38:24.038878 kernel: ACPI: SRAT 0x000000003FFD4000 0002D0 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:38:24.038892 kernel: ACPI: BGRT 0x000000003FFD3000 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:38:24.038904 kernel: ACPI: FPDT 0x000000003FFD2000 000034 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:38:24.038916 kernel: ACPI: Reserving FACP table memory at [mem 0x3fff8000-0x3fff8113] May 17 00:38:24.038928 kernel: ACPI: Reserving DSDT table memory at [mem 0x3ffd6000-0x3fff4183] May 17 00:38:24.038940 kernel: ACPI: Reserving FACS table memory at [mem 0x3fffe000-0x3fffe03f] May 17 00:38:24.038951 kernel: ACPI: Reserving OEM0 table memory at [mem 0x3fff7000-0x3fff7063] May 17 00:38:24.038964 kernel: ACPI: Reserving SPCR table memory at [mem 0x3fff6000-0x3fff604f] May 17 00:38:24.038975 kernel: ACPI: Reserving WAET table memory at [mem 0x3fff5000-0x3fff5027] May 17 00:38:24.038990 kernel: ACPI: Reserving APIC table memory at [mem 0x3ffd5000-0x3ffd5057] May 17 00:38:24.039002 kernel: ACPI: Reserving SRAT table memory at [mem 0x3ffd4000-0x3ffd42cf] May 17 00:38:24.039015 kernel: ACPI: Reserving BGRT table memory at [mem 0x3ffd3000-0x3ffd3037] May 17 00:38:24.039026 kernel: ACPI: Reserving FPDT table memory at [mem 0x3ffd2000-0x3ffd2033] May 17 00:38:24.039038 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 May 17 00:38:24.039050 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 May 17 00:38:24.039062 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x3fffffff] hotplug May 17 00:38:24.039075 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x2bfffffff] hotplug May 17 00:38:24.039087 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2c0000000-0xfdfffffff] hotplug May 17 00:38:24.039102 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000-0xffffffffff] hotplug May 17 00:38:24.039115 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x10000000000-0x1ffffffffff] hotplug May 17 00:38:24.039128 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x20000000000-0x3ffffffffff] hotplug May 17 00:38:24.039140 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x40000000000-0x7ffffffffff] hotplug May 17 00:38:24.039152 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000000-0xfffffffffff] hotplug May 17 00:38:24.039164 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000000-0x1fffffffffff] hotplug May 17 00:38:24.039176 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x200000000000-0x3fffffffffff] hotplug May 17 00:38:24.039188 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x400000000000-0x7fffffffffff] hotplug May 17 00:38:24.039201 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x800000000000-0xffffffffffff] hotplug May 17 00:38:24.039215 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000000-0x1ffffffffffff] hotplug May 17 00:38:24.039228 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2000000000000-0x3ffffffffffff] hotplug May 17 00:38:24.039240 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x4000000000000-0x7ffffffffffff] hotplug May 17 00:38:24.039252 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x8000000000000-0xfffffffffffff] hotplug May 17 00:38:24.039265 kernel: NUMA: Node 0 [mem 0x00000000-0x3fffffff] + [mem 0x100000000-0x2bfffffff] -> [mem 0x00000000-0x2bfffffff] May 17 00:38:24.039278 kernel: NODE_DATA(0) allocated [mem 0x2bfffa000-0x2bfffffff] May 17 00:38:24.039289 kernel: Zone ranges: May 17 00:38:24.039302 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 17 00:38:24.039314 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] May 17 00:38:24.039330 kernel: Normal [mem 0x0000000100000000-0x00000002bfffffff] May 17 00:38:24.039342 kernel: Movable zone start for each node May 17 00:38:24.039354 kernel: Early memory node ranges May 17 00:38:24.039367 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] May 17 00:38:24.039379 kernel: node 0: [mem 0x0000000000100000-0x000000003ff40fff] May 17 00:38:24.039391 kernel: node 0: [mem 0x000000003ffff000-0x000000003fffffff] May 17 00:38:24.039403 kernel: node 0: [mem 0x0000000100000000-0x00000002bfffffff] May 17 00:38:24.039415 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000002bfffffff] May 17 00:38:24.039427 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 17 00:38:24.039442 kernel: On node 0, zone DMA: 96 pages in unavailable ranges May 17 00:38:24.039473 kernel: On node 0, zone DMA32: 190 pages in unavailable ranges May 17 00:38:24.039487 kernel: ACPI: PM-Timer IO Port: 0x408 May 17 00:38:24.039499 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] dfl dfl lint[0x1]) May 17 00:38:24.039512 kernel: IOAPIC[0]: apic_id 2, version 17, address 0xfec00000, GSI 0-23 May 17 00:38:24.039524 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 17 00:38:24.039536 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 17 00:38:24.039548 kernel: ACPI: SPCR: console: uart,io,0x3f8,115200 May 17 00:38:24.039560 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs May 17 00:38:24.039576 kernel: [mem 0x40000000-0xffffffff] available for PCI devices May 17 00:38:24.039588 kernel: Booting paravirtualized kernel on Hyper-V May 17 00:38:24.039600 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 17 00:38:24.039612 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 May 17 00:38:24.039625 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 May 17 00:38:24.039638 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 May 17 00:38:24.039650 kernel: pcpu-alloc: [0] 0 1 May 17 00:38:24.039661 kernel: Hyper-V: PV spinlocks enabled May 17 00:38:24.039673 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) May 17 00:38:24.039688 kernel: Built 1 zonelists, mobility grouping on. Total pages: 2062618 May 17 00:38:24.039700 kernel: Policy zone: Normal May 17 00:38:24.039716 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:38:24.039728 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 17 00:38:24.039741 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) May 17 00:38:24.039753 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 17 00:38:24.039766 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 17 00:38:24.039779 kernel: Memory: 8079144K/8387460K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47472K init, 4108K bss, 308056K reserved, 0K cma-reserved) May 17 00:38:24.039793 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 May 17 00:38:24.039806 kernel: ftrace: allocating 34585 entries in 136 pages May 17 00:38:24.039827 kernel: ftrace: allocated 136 pages with 2 groups May 17 00:38:24.039841 kernel: rcu: Hierarchical RCU implementation. May 17 00:38:24.039855 kernel: rcu: RCU event tracing is enabled. May 17 00:38:24.039868 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. May 17 00:38:24.039880 kernel: Rude variant of Tasks RCU enabled. May 17 00:38:24.039892 kernel: Tracing variant of Tasks RCU enabled. May 17 00:38:24.039905 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 17 00:38:24.039917 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 May 17 00:38:24.039930 kernel: Using NULL legacy PIC May 17 00:38:24.039945 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 0 May 17 00:38:24.039958 kernel: Console: colour dummy device 80x25 May 17 00:38:24.039971 kernel: printk: console [tty1] enabled May 17 00:38:24.039983 kernel: printk: console [ttyS0] enabled May 17 00:38:24.039996 kernel: printk: bootconsole [earlyser0] disabled May 17 00:38:24.040011 kernel: ACPI: Core revision 20210730 May 17 00:38:24.040024 kernel: Failed to register legacy timer interrupt May 17 00:38:24.040036 kernel: APIC: Switch to symmetric I/O mode setup May 17 00:38:24.040049 kernel: Hyper-V: Using IPI hypercalls May 17 00:38:24.040062 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 5187.81 BogoMIPS (lpj=2593905) May 17 00:38:24.040075 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 May 17 00:38:24.040088 kernel: Last level dTLB entries: 4KB 64, 2MB 32, 4MB 32, 1GB 4 May 17 00:38:24.040100 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 17 00:38:24.040113 kernel: Spectre V2 : Mitigation: Retpolines May 17 00:38:24.040125 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 17 00:38:24.040140 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! May 17 00:38:24.040153 kernel: RETBleed: Vulnerable May 17 00:38:24.040166 kernel: Speculative Store Bypass: Vulnerable May 17 00:38:24.040178 kernel: TAA: Vulnerable: Clear CPU buffers attempted, no microcode May 17 00:38:24.040192 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode May 17 00:38:24.040204 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 17 00:38:24.040217 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 17 00:38:24.040230 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 17 00:38:24.040243 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' May 17 00:38:24.040256 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' May 17 00:38:24.040271 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' May 17 00:38:24.040285 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 17 00:38:24.040298 kernel: x86/fpu: xstate_offset[5]: 832, xstate_sizes[5]: 64 May 17 00:38:24.040311 kernel: x86/fpu: xstate_offset[6]: 896, xstate_sizes[6]: 512 May 17 00:38:24.040324 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024 May 17 00:38:24.040337 kernel: x86/fpu: Enabled xstate features 0xe7, context size is 2432 bytes, using 'compacted' format. May 17 00:38:24.040350 kernel: Freeing SMP alternatives memory: 32K May 17 00:38:24.040363 kernel: pid_max: default: 32768 minimum: 301 May 17 00:38:24.040375 kernel: LSM: Security Framework initializing May 17 00:38:24.040388 kernel: SELinux: Initializing. May 17 00:38:24.040401 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) May 17 00:38:24.040414 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) May 17 00:38:24.040430 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz (family: 0x6, model: 0x55, stepping: 0x7) May 17 00:38:24.040443 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. May 17 00:38:24.040493 kernel: signal: max sigframe size: 3632 May 17 00:38:24.040505 kernel: rcu: Hierarchical SRCU implementation. May 17 00:38:24.040517 kernel: NMI watchdog: Perf NMI watchdog permanently disabled May 17 00:38:24.040529 kernel: smp: Bringing up secondary CPUs ... May 17 00:38:24.040541 kernel: x86: Booting SMP configuration: May 17 00:38:24.040554 kernel: .... node #0, CPUs: #1 May 17 00:38:24.040567 kernel: TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details. May 17 00:38:24.040585 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. May 17 00:38:24.040596 kernel: smp: Brought up 1 node, 2 CPUs May 17 00:38:24.040610 kernel: smpboot: Max logical packages: 1 May 17 00:38:24.040623 kernel: smpboot: Total of 2 processors activated (10375.62 BogoMIPS) May 17 00:38:24.040635 kernel: devtmpfs: initialized May 17 00:38:24.040648 kernel: x86/mm: Memory block size: 128MB May 17 00:38:24.040661 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x3fffb000-0x3fffefff] (16384 bytes) May 17 00:38:24.040674 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 17 00:38:24.040687 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) May 17 00:38:24.040702 kernel: pinctrl core: initialized pinctrl subsystem May 17 00:38:24.040715 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 17 00:38:24.040728 kernel: audit: initializing netlink subsys (disabled) May 17 00:38:24.040740 kernel: audit: type=2000 audit(1747442303.023:1): state=initialized audit_enabled=0 res=1 May 17 00:38:24.040752 kernel: thermal_sys: Registered thermal governor 'step_wise' May 17 00:38:24.040764 kernel: thermal_sys: Registered thermal governor 'user_space' May 17 00:38:24.040776 kernel: cpuidle: using governor menu May 17 00:38:24.040788 kernel: ACPI: bus type PCI registered May 17 00:38:24.040800 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 17 00:38:24.040816 kernel: dca service started, version 1.12.1 May 17 00:38:24.040828 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 17 00:38:24.040841 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 17 00:38:24.040855 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 17 00:38:24.040868 kernel: ACPI: Added _OSI(Module Device) May 17 00:38:24.040881 kernel: ACPI: Added _OSI(Processor Device) May 17 00:38:24.040893 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 17 00:38:24.040906 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 17 00:38:24.040918 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 17 00:38:24.040934 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 17 00:38:24.040947 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 17 00:38:24.040960 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 17 00:38:24.040973 kernel: ACPI: Interpreter enabled May 17 00:38:24.040986 kernel: ACPI: PM: (supports S0 S5) May 17 00:38:24.040998 kernel: ACPI: Using IOAPIC for interrupt routing May 17 00:38:24.041011 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 17 00:38:24.041025 kernel: ACPI: Enabled 1 GPEs in block 00 to 0F May 17 00:38:24.041038 kernel: iommu: Default domain type: Translated May 17 00:38:24.041052 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 17 00:38:24.041065 kernel: vgaarb: loaded May 17 00:38:24.041077 kernel: pps_core: LinuxPPS API ver. 1 registered May 17 00:38:24.041089 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 17 00:38:24.041099 kernel: PTP clock support registered May 17 00:38:24.041111 kernel: Registered efivars operations May 17 00:38:24.041123 kernel: PCI: Using ACPI for IRQ routing May 17 00:38:24.041136 kernel: PCI: System does not support PCI May 17 00:38:24.041150 kernel: clocksource: Switched to clocksource hyperv_clocksource_tsc_page May 17 00:38:24.041167 kernel: VFS: Disk quotas dquot_6.6.0 May 17 00:38:24.041180 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 17 00:38:24.041192 kernel: pnp: PnP ACPI init May 17 00:38:24.041203 kernel: pnp: PnP ACPI: found 3 devices May 17 00:38:24.041216 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 17 00:38:24.041230 kernel: NET: Registered PF_INET protocol family May 17 00:38:24.041244 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) May 17 00:38:24.041257 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) May 17 00:38:24.041271 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 17 00:38:24.041288 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) May 17 00:38:24.041302 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) May 17 00:38:24.041315 kernel: TCP: Hash tables configured (established 65536 bind 65536) May 17 00:38:24.041329 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) May 17 00:38:24.041344 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) May 17 00:38:24.041358 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 17 00:38:24.041372 kernel: NET: Registered PF_XDP protocol family May 17 00:38:24.041386 kernel: PCI: CLS 0 bytes, default 64 May 17 00:38:24.041399 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) May 17 00:38:24.041413 kernel: software IO TLB: mapped [mem 0x000000003a8ad000-0x000000003e8ad000] (64MB) May 17 00:38:24.041425 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer May 17 00:38:24.041436 kernel: Initialise system trusted keyrings May 17 00:38:24.043474 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 May 17 00:38:24.043500 kernel: Key type asymmetric registered May 17 00:38:24.043514 kernel: Asymmetric key parser 'x509' registered May 17 00:38:24.043528 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 17 00:38:24.043542 kernel: io scheduler mq-deadline registered May 17 00:38:24.043555 kernel: io scheduler kyber registered May 17 00:38:24.043572 kernel: io scheduler bfq registered May 17 00:38:24.043586 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 17 00:38:24.043600 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 17 00:38:24.043613 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 17 00:38:24.043627 kernel: 00:01: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A May 17 00:38:24.043640 kernel: i8042: PNP: No PS/2 controller found. May 17 00:38:24.043805 kernel: rtc_cmos 00:02: registered as rtc0 May 17 00:38:24.043923 kernel: rtc_cmos 00:02: setting system clock to 2025-05-17T00:38:23 UTC (1747442303) May 17 00:38:24.044033 kernel: rtc_cmos 00:02: alarms up to one month, 114 bytes nvram May 17 00:38:24.044049 kernel: intel_pstate: CPU model not supported May 17 00:38:24.044063 kernel: efifb: probing for efifb May 17 00:38:24.044076 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k May 17 00:38:24.044090 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 May 17 00:38:24.044103 kernel: efifb: scrolling: redraw May 17 00:38:24.044116 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 May 17 00:38:24.044129 kernel: Console: switching to colour frame buffer device 128x48 May 17 00:38:24.044144 kernel: fb0: EFI VGA frame buffer device May 17 00:38:24.044158 kernel: pstore: Registered efi as persistent store backend May 17 00:38:24.044171 kernel: NET: Registered PF_INET6 protocol family May 17 00:38:24.044184 kernel: Segment Routing with IPv6 May 17 00:38:24.044198 kernel: In-situ OAM (IOAM) with IPv6 May 17 00:38:24.044211 kernel: NET: Registered PF_PACKET protocol family May 17 00:38:24.044224 kernel: Key type dns_resolver registered May 17 00:38:24.044237 kernel: IPI shorthand broadcast: enabled May 17 00:38:24.044250 kernel: sched_clock: Marking stable (689501300, 19476000)->(866801400, -157824100) May 17 00:38:24.044263 kernel: registered taskstats version 1 May 17 00:38:24.044278 kernel: Loading compiled-in X.509 certificates May 17 00:38:24.044291 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.182-flatcar: 01ca23caa8e5879327538f9287e5164b3e97ac0c' May 17 00:38:24.044305 kernel: Key type .fscrypt registered May 17 00:38:24.044317 kernel: Key type fscrypt-provisioning registered May 17 00:38:24.044331 kernel: pstore: Using crash dump compression: deflate May 17 00:38:24.044344 kernel: ima: No TPM chip found, activating TPM-bypass! May 17 00:38:24.044357 kernel: ima: Allocated hash algorithm: sha1 May 17 00:38:24.044370 kernel: ima: No architecture policies found May 17 00:38:24.044384 kernel: clk: Disabling unused clocks May 17 00:38:24.044397 kernel: Freeing unused kernel image (initmem) memory: 47472K May 17 00:38:24.044409 kernel: Write protecting the kernel read-only data: 28672k May 17 00:38:24.044422 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 17 00:38:24.044434 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 17 00:38:24.044458 kernel: Run /init as init process May 17 00:38:24.044469 kernel: with arguments: May 17 00:38:24.044481 kernel: /init May 17 00:38:24.044493 kernel: with environment: May 17 00:38:24.044507 kernel: HOME=/ May 17 00:38:24.046490 kernel: TERM=linux May 17 00:38:24.046504 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 17 00:38:24.046519 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 00:38:24.046536 systemd[1]: Detected virtualization microsoft. May 17 00:38:24.046548 systemd[1]: Detected architecture x86-64. May 17 00:38:24.046560 systemd[1]: Running in initrd. May 17 00:38:24.046574 systemd[1]: No hostname configured, using default hostname. May 17 00:38:24.046592 systemd[1]: Hostname set to . May 17 00:38:24.046607 systemd[1]: Initializing machine ID from random generator. May 17 00:38:24.046621 systemd[1]: Queued start job for default target initrd.target. May 17 00:38:24.046636 systemd[1]: Started systemd-ask-password-console.path. May 17 00:38:24.046651 systemd[1]: Reached target cryptsetup.target. May 17 00:38:24.046663 systemd[1]: Reached target paths.target. May 17 00:38:24.046675 systemd[1]: Reached target slices.target. May 17 00:38:24.046688 systemd[1]: Reached target swap.target. May 17 00:38:24.046702 systemd[1]: Reached target timers.target. May 17 00:38:24.046716 systemd[1]: Listening on iscsid.socket. May 17 00:38:24.046731 systemd[1]: Listening on iscsiuio.socket. May 17 00:38:24.046744 systemd[1]: Listening on systemd-journald-audit.socket. May 17 00:38:24.046757 systemd[1]: Listening on systemd-journald-dev-log.socket. May 17 00:38:24.046773 systemd[1]: Listening on systemd-journald.socket. May 17 00:38:24.046787 systemd[1]: Listening on systemd-networkd.socket. May 17 00:38:24.046800 systemd[1]: Listening on systemd-udevd-control.socket. May 17 00:38:24.046818 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 00:38:24.046832 systemd[1]: Reached target sockets.target. May 17 00:38:24.046848 systemd[1]: Starting kmod-static-nodes.service... May 17 00:38:24.046862 systemd[1]: Finished network-cleanup.service. May 17 00:38:24.046878 systemd[1]: Starting systemd-fsck-usr.service... May 17 00:38:24.046893 systemd[1]: Starting systemd-journald.service... May 17 00:38:24.046909 systemd[1]: Starting systemd-modules-load.service... May 17 00:38:24.046924 systemd[1]: Starting systemd-resolved.service... May 17 00:38:24.046939 systemd[1]: Starting systemd-vconsole-setup.service... May 17 00:38:24.046962 systemd-journald[183]: Journal started May 17 00:38:24.047031 systemd-journald[183]: Runtime Journal (/run/log/journal/4351a22c53274e9f95a8ba8b4ffcec0d) is 8.0M, max 159.0M, 151.0M free. May 17 00:38:24.041785 systemd-modules-load[184]: Inserted module 'overlay' May 17 00:38:24.052654 systemd[1]: Finished kmod-static-nodes.service. May 17 00:38:24.057000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:24.076462 kernel: audit: type=1130 audit(1747442304.057:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:24.076519 systemd[1]: Started systemd-journald.service. May 17 00:38:24.080000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:24.081088 systemd[1]: Finished systemd-fsck-usr.service. May 17 00:38:24.096750 kernel: audit: type=1130 audit(1747442304.080:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:24.093077 systemd[1]: Finished systemd-vconsole-setup.service. May 17 00:38:24.097698 systemd[1]: Starting dracut-cmdline-ask.service... May 17 00:38:24.105025 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 17 00:38:24.092000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:24.115149 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 17 00:38:24.119594 systemd-resolved[185]: Positive Trust Anchors: May 17 00:38:24.119606 systemd-resolved[185]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 00:38:24.119640 systemd-resolved[185]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 00:38:24.122331 systemd-resolved[185]: Defaulting to hostname 'linux'. May 17 00:38:24.126026 systemd[1]: Started systemd-resolved.service. May 17 00:38:24.126363 systemd[1]: Reached target nss-lookup.target. May 17 00:38:24.150478 kernel: audit: type=1130 audit(1747442304.092:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:24.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:24.186376 kernel: audit: type=1130 audit(1747442304.096:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:24.188200 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 17 00:38:24.188226 kernel: audit: type=1130 audit(1747442304.125:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:24.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:24.175488 systemd[1]: Finished dracut-cmdline-ask.service. May 17 00:38:24.189275 systemd[1]: Starting dracut-cmdline.service... May 17 00:38:24.204699 kernel: audit: type=1130 audit(1747442304.125:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:24.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:24.187000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:24.216986 kernel: audit: type=1130 audit(1747442304.187:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:24.217032 kernel: Bridge firewalling registered May 17 00:38:24.219524 systemd-modules-load[184]: Inserted module 'br_netfilter' May 17 00:38:24.225186 dracut-cmdline[199]: dracut-dracut-053 May 17 00:38:24.229951 dracut-cmdline[199]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:38:24.262474 kernel: SCSI subsystem initialized May 17 00:38:24.286901 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 17 00:38:24.286974 kernel: device-mapper: uevent: version 1.0.3 May 17 00:38:24.291981 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 17 00:38:24.296144 systemd-modules-load[184]: Inserted module 'dm_multipath' May 17 00:38:24.296796 systemd[1]: Finished systemd-modules-load.service. May 17 00:38:24.321601 kernel: audit: type=1130 audit(1747442304.300:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:24.300000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:24.301493 systemd[1]: Starting systemd-sysctl.service... May 17 00:38:24.322805 systemd[1]: Finished systemd-sysctl.service. May 17 00:38:24.326000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:24.338478 kernel: audit: type=1130 audit(1747442304.326:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:24.338556 kernel: Loading iSCSI transport class v2.0-870. May 17 00:38:24.361467 kernel: iscsi: registered transport (tcp) May 17 00:38:24.385477 kernel: iscsi: registered transport (qla4xxx) May 17 00:38:24.385541 kernel: QLogic iSCSI HBA Driver May 17 00:38:24.417601 systemd[1]: Finished dracut-cmdline.service. May 17 00:38:24.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:24.422174 systemd[1]: Starting dracut-pre-udev.service... May 17 00:38:24.472476 kernel: raid6: avx512x4 gen() 18288 MB/s May 17 00:38:24.491463 kernel: raid6: avx512x4 xor() 7573 MB/s May 17 00:38:24.511456 kernel: raid6: avx512x2 gen() 18222 MB/s May 17 00:38:24.531462 kernel: raid6: avx512x2 xor() 29499 MB/s May 17 00:38:24.550459 kernel: raid6: avx512x1 gen() 18240 MB/s May 17 00:38:24.569468 kernel: raid6: avx512x1 xor() 26690 MB/s May 17 00:38:24.589463 kernel: raid6: avx2x4 gen() 18156 MB/s May 17 00:38:24.608458 kernel: raid6: avx2x4 xor() 7492 MB/s May 17 00:38:24.627457 kernel: raid6: avx2x2 gen() 18178 MB/s May 17 00:38:24.647460 kernel: raid6: avx2x2 xor() 21877 MB/s May 17 00:38:24.666460 kernel: raid6: avx2x1 gen() 13902 MB/s May 17 00:38:24.685464 kernel: raid6: avx2x1 xor() 18921 MB/s May 17 00:38:24.705463 kernel: raid6: sse2x4 gen() 11633 MB/s May 17 00:38:24.724458 kernel: raid6: sse2x4 xor() 7018 MB/s May 17 00:38:24.744457 kernel: raid6: sse2x2 gen() 12840 MB/s May 17 00:38:24.764459 kernel: raid6: sse2x2 xor() 7593 MB/s May 17 00:38:24.783469 kernel: raid6: sse2x1 gen() 11362 MB/s May 17 00:38:24.806176 kernel: raid6: sse2x1 xor() 5855 MB/s May 17 00:38:24.806198 kernel: raid6: using algorithm avx512x4 gen() 18288 MB/s May 17 00:38:24.806218 kernel: raid6: .... xor() 7573 MB/s, rmw enabled May 17 00:38:24.813107 kernel: raid6: using avx512x2 recovery algorithm May 17 00:38:24.828478 kernel: xor: automatically using best checksumming function avx May 17 00:38:24.923476 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 17 00:38:24.932205 systemd[1]: Finished dracut-pre-udev.service. May 17 00:38:24.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:24.936000 audit: BPF prog-id=7 op=LOAD May 17 00:38:24.936000 audit: BPF prog-id=8 op=LOAD May 17 00:38:24.937229 systemd[1]: Starting systemd-udevd.service... May 17 00:38:24.951620 systemd-udevd[384]: Using default interface naming scheme 'v252'. May 17 00:38:24.956360 systemd[1]: Started systemd-udevd.service. May 17 00:38:24.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:24.966306 systemd[1]: Starting dracut-pre-trigger.service... May 17 00:38:24.981815 dracut-pre-trigger[405]: rd.md=0: removing MD RAID activation May 17 00:38:25.014820 systemd[1]: Finished dracut-pre-trigger.service. May 17 00:38:25.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:25.019629 systemd[1]: Starting systemd-udev-trigger.service... May 17 00:38:25.059033 systemd[1]: Finished systemd-udev-trigger.service. May 17 00:38:25.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:25.106470 kernel: cryptd: max_cpu_qlen set to 1000 May 17 00:38:25.146622 kernel: AVX2 version of gcm_enc/dec engaged. May 17 00:38:25.146688 kernel: AES CTR mode by8 optimization enabled May 17 00:38:25.149345 kernel: hv_vmbus: Vmbus version:5.2 May 17 00:38:25.171471 kernel: hv_vmbus: registering driver hv_storvsc May 17 00:38:25.179651 kernel: hv_vmbus: registering driver hyperv_keyboard May 17 00:38:25.179708 kernel: scsi host1: storvsc_host_t May 17 00:38:25.179748 kernel: scsi host0: storvsc_host_t May 17 00:38:25.187576 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 May 17 00:38:25.197916 kernel: hid: raw HID events driver (C) Jiri Kosina May 17 00:38:25.197969 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 May 17 00:38:25.205768 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 May 17 00:38:25.205811 kernel: hv_vmbus: registering driver hv_netvsc May 17 00:38:25.219474 kernel: hv_vmbus: registering driver hid_hyperv May 17 00:38:25.238658 kernel: sr 0:0:0:2: [sr0] scsi-1 drive May 17 00:38:25.270553 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 May 17 00:38:25.270576 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 May 17 00:38:25.270598 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) May 17 00:38:25.281616 kernel: hid-generic 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on May 17 00:38:25.281782 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks May 17 00:38:25.281950 kernel: sd 0:0:0:0: [sda] Write Protect is off May 17 00:38:25.282106 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 May 17 00:38:25.282259 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA May 17 00:38:25.282409 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 May 17 00:38:25.282572 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 00:38:25.282589 kernel: sd 0:0:0:0: [sda] Attached SCSI disk May 17 00:38:25.322475 kernel: hv_netvsc 6045bdfb-f30f-6045-bdfb-f30f6045bdfb eth0: VF slot 1 added May 17 00:38:25.333591 kernel: hv_vmbus: registering driver hv_pci May 17 00:38:25.339480 kernel: hv_pci b2367287-17a1-452f-802b-5b56d90fac2d: PCI VMBus probing: Using version 0x10004 May 17 00:38:25.406495 kernel: hv_pci b2367287-17a1-452f-802b-5b56d90fac2d: PCI host bridge to bus 17a1:00 May 17 00:38:25.406681 kernel: pci_bus 17a1:00: root bus resource [mem 0xfe0000000-0xfe00fffff window] May 17 00:38:25.406860 kernel: pci_bus 17a1:00: No busn resource found for root bus, will use [bus 00-ff] May 17 00:38:25.407013 kernel: pci 17a1:00:02.0: [15b3:1016] type 00 class 0x020000 May 17 00:38:25.407184 kernel: pci 17a1:00:02.0: reg 0x10: [mem 0xfe0000000-0xfe00fffff 64bit pref] May 17 00:38:25.407339 kernel: pci 17a1:00:02.0: enabling Extended Tags May 17 00:38:25.407530 kernel: pci 17a1:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at 17a1:00:02.0 (capable of 63.008 Gb/s with 8.0 GT/s PCIe x8 link) May 17 00:38:25.407685 kernel: pci_bus 17a1:00: busn_res: [bus 00-ff] end is updated to 00 May 17 00:38:25.407844 kernel: pci 17a1:00:02.0: BAR 0: assigned [mem 0xfe0000000-0xfe00fffff 64bit pref] May 17 00:38:25.498478 kernel: mlx5_core 17a1:00:02.0: firmware version: 14.30.5000 May 17 00:38:25.753235 kernel: mlx5_core 17a1:00:02.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) May 17 00:38:25.753427 kernel: mlx5_core 17a1:00:02.0: Supported tc offload range - chains: 1, prios: 1 May 17 00:38:25.753599 kernel: mlx5_core 17a1:00:02.0: mlx5e_tc_post_act_init:40:(pid 7): firmware level support is missing May 17 00:38:25.753755 kernel: hv_netvsc 6045bdfb-f30f-6045-bdfb-f30f6045bdfb eth0: VF registering: eth1 May 17 00:38:25.753922 kernel: mlx5_core 17a1:00:02.0 eth1: joined to eth0 May 17 00:38:25.754085 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (442) May 17 00:38:25.737688 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 17 00:38:25.765484 kernel: mlx5_core 17a1:00:02.0 enP6049s1: renamed from eth1 May 17 00:38:25.769324 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 00:38:25.972697 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 17 00:38:26.012817 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 17 00:38:26.018547 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 17 00:38:26.025498 systemd[1]: Starting disk-uuid.service... May 17 00:38:26.038474 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 00:38:26.045470 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 00:38:27.053294 disk-uuid[567]: The operation has completed successfully. May 17 00:38:27.055668 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 00:38:27.127946 systemd[1]: disk-uuid.service: Deactivated successfully. May 17 00:38:27.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:27.132000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:27.128053 systemd[1]: Finished disk-uuid.service. May 17 00:38:27.138859 systemd[1]: Starting verity-setup.service... May 17 00:38:27.214478 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" May 17 00:38:27.478755 systemd[1]: Found device dev-mapper-usr.device. May 17 00:38:27.482781 systemd[1]: Mounting sysusr-usr.mount... May 17 00:38:27.486000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:27.487061 systemd[1]: Finished verity-setup.service. May 17 00:38:27.559502 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 17 00:38:27.559632 systemd[1]: Mounted sysusr-usr.mount. May 17 00:38:27.561767 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 17 00:38:27.562577 systemd[1]: Starting ignition-setup.service... May 17 00:38:27.566726 systemd[1]: Starting parse-ip-for-networkd.service... May 17 00:38:27.593923 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm May 17 00:38:27.593997 kernel: BTRFS info (device sda6): using free space tree May 17 00:38:27.594016 kernel: BTRFS info (device sda6): has skinny extents May 17 00:38:27.636370 systemd[1]: Finished parse-ip-for-networkd.service. May 17 00:38:27.638000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:27.640000 audit: BPF prog-id=9 op=LOAD May 17 00:38:27.640991 systemd[1]: Starting systemd-networkd.service... May 17 00:38:27.667996 systemd-networkd[805]: lo: Link UP May 17 00:38:27.668345 systemd-networkd[805]: lo: Gained carrier May 17 00:38:27.670025 systemd-networkd[805]: Enumeration completed May 17 00:38:27.673232 systemd-networkd[805]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 00:38:27.676881 systemd[1]: Started systemd-networkd.service. May 17 00:38:27.680000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:27.680806 systemd[1]: Reached target network.target. May 17 00:38:27.685175 systemd[1]: Starting iscsiuio.service... May 17 00:38:27.691222 systemd[1]: Started iscsiuio.service. May 17 00:38:27.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:27.693160 systemd[1]: Starting iscsid.service... May 17 00:38:27.698715 iscsid[813]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 17 00:38:27.698715 iscsid[813]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log May 17 00:38:27.698715 iscsid[813]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 17 00:38:27.698715 iscsid[813]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 17 00:38:27.698715 iscsid[813]: If using hardware iscsi like qla4xxx this message can be ignored. May 17 00:38:27.698715 iscsid[813]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 17 00:38:27.698715 iscsid[813]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 17 00:38:27.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:27.699926 systemd[1]: Started iscsid.service. May 17 00:38:27.718137 systemd[1]: Starting dracut-initqueue.service... May 17 00:38:27.724081 systemd[1]: mnt-oem.mount: Deactivated successfully. May 17 00:38:27.741125 systemd[1]: Finished dracut-initqueue.service. May 17 00:38:27.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:27.742985 systemd[1]: Reached target remote-fs-pre.target. May 17 00:38:27.747758 systemd[1]: Reached target remote-cryptsetup.target. May 17 00:38:27.751497 systemd[1]: Reached target remote-fs.target. May 17 00:38:27.754155 systemd[1]: Starting dracut-pre-mount.service... May 17 00:38:27.764471 kernel: mlx5_core 17a1:00:02.0 enP6049s1: Link up May 17 00:38:27.770497 systemd[1]: Finished dracut-pre-mount.service. May 17 00:38:27.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:27.796504 kernel: hv_netvsc 6045bdfb-f30f-6045-bdfb-f30f6045bdfb eth0: Data path switched to VF: enP6049s1 May 17 00:38:27.801857 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:38:27.801340 systemd-networkd[805]: enP6049s1: Link UP May 17 00:38:27.801497 systemd-networkd[805]: eth0: Link UP May 17 00:38:27.801701 systemd-networkd[805]: eth0: Gained carrier May 17 00:38:27.807173 systemd-networkd[805]: enP6049s1: Gained carrier May 17 00:38:27.842551 systemd-networkd[805]: eth0: DHCPv4 address 10.200.4.18/24, gateway 10.200.4.1 acquired from 168.63.129.16 May 17 00:38:27.849765 systemd[1]: Finished ignition-setup.service. May 17 00:38:27.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:27.854251 systemd[1]: Starting ignition-fetch-offline.service... May 17 00:38:29.391745 systemd-networkd[805]: eth0: Gained IPv6LL May 17 00:38:31.927604 ignition[832]: Ignition 2.14.0 May 17 00:38:31.927621 ignition[832]: Stage: fetch-offline May 17 00:38:31.927712 ignition[832]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:38:31.927765 ignition[832]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:38:32.028254 ignition[832]: no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:38:32.028461 ignition[832]: parsed url from cmdline: "" May 17 00:38:32.028466 ignition[832]: no config URL provided May 17 00:38:32.028474 ignition[832]: reading system config file "/usr/lib/ignition/user.ign" May 17 00:38:32.031327 ignition[832]: no config at "/usr/lib/ignition/user.ign" May 17 00:38:32.031338 ignition[832]: failed to fetch config: resource requires networking May 17 00:38:32.033256 ignition[832]: Ignition finished successfully May 17 00:38:32.042259 systemd[1]: Finished ignition-fetch-offline.service. May 17 00:38:32.056477 kernel: kauditd_printk_skb: 18 callbacks suppressed May 17 00:38:32.056544 kernel: audit: type=1130 audit(1747442312.046:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:32.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:32.047481 systemd[1]: Starting ignition-fetch.service... May 17 00:38:32.065092 ignition[838]: Ignition 2.14.0 May 17 00:38:32.065099 ignition[838]: Stage: fetch May 17 00:38:32.065225 ignition[838]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:38:32.065251 ignition[838]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:38:32.074696 ignition[838]: no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:38:32.077347 ignition[838]: parsed url from cmdline: "" May 17 00:38:32.077355 ignition[838]: no config URL provided May 17 00:38:32.077363 ignition[838]: reading system config file "/usr/lib/ignition/user.ign" May 17 00:38:32.077376 ignition[838]: no config at "/usr/lib/ignition/user.ign" May 17 00:38:32.077415 ignition[838]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 May 17 00:38:32.166112 ignition[838]: GET result: OK May 17 00:38:32.166212 ignition[838]: config has been read from IMDS userdata May 17 00:38:32.166239 ignition[838]: parsing config with SHA512: d94334a0e365f6dfbae72e9166293ee46d9b119dae6c8de90fcdccd83a41edfe6e138fcc6a62b2a70b4e63851204a21050e22885da3fd6310c635a95148d91b2 May 17 00:38:32.173001 unknown[838]: fetched base config from "system" May 17 00:38:32.173016 unknown[838]: fetched base config from "system" May 17 00:38:32.173025 unknown[838]: fetched user config from "azure" May 17 00:38:32.178888 ignition[838]: fetch: fetch complete May 17 00:38:32.178898 ignition[838]: fetch: fetch passed May 17 00:38:32.178955 ignition[838]: Ignition finished successfully May 17 00:38:32.184804 systemd[1]: Finished ignition-fetch.service. May 17 00:38:32.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:32.187585 systemd[1]: Starting ignition-kargs.service... May 17 00:38:32.201978 kernel: audit: type=1130 audit(1747442312.186:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:32.210162 ignition[844]: Ignition 2.14.0 May 17 00:38:32.210174 ignition[844]: Stage: kargs May 17 00:38:32.210310 ignition[844]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:38:32.210342 ignition[844]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:38:32.218588 ignition[844]: no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:38:32.223892 ignition[844]: kargs: kargs passed May 17 00:38:32.223955 ignition[844]: Ignition finished successfully May 17 00:38:32.228571 systemd[1]: Finished ignition-kargs.service. May 17 00:38:32.231365 systemd[1]: Starting ignition-disks.service... May 17 00:38:32.230000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:32.241419 ignition[850]: Ignition 2.14.0 May 17 00:38:32.247709 kernel: audit: type=1130 audit(1747442312.230:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:32.241646 ignition[850]: Stage: disks May 17 00:38:32.241778 ignition[850]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:38:32.241808 ignition[850]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:38:32.248204 ignition[850]: no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:38:32.250835 ignition[850]: disks: disks passed May 17 00:38:32.250899 ignition[850]: Ignition finished successfully May 17 00:38:32.257835 systemd[1]: Finished ignition-disks.service. May 17 00:38:32.261000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:32.261629 systemd[1]: Reached target initrd-root-device.target. May 17 00:38:32.276006 kernel: audit: type=1130 audit(1747442312.261:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:32.276116 systemd[1]: Reached target local-fs-pre.target. May 17 00:38:32.279893 systemd[1]: Reached target local-fs.target. May 17 00:38:32.283489 systemd[1]: Reached target sysinit.target. May 17 00:38:32.284778 systemd[1]: Reached target basic.target. May 17 00:38:32.291116 systemd[1]: Starting systemd-fsck-root.service... May 17 00:38:32.358477 systemd-fsck[858]: ROOT: clean, 619/7326000 files, 481079/7359488 blocks May 17 00:38:32.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:32.363382 systemd[1]: Finished systemd-fsck-root.service. May 17 00:38:32.378561 kernel: audit: type=1130 audit(1747442312.365:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:32.366705 systemd[1]: Mounting sysroot.mount... May 17 00:38:32.391411 systemd[1]: Mounted sysroot.mount. May 17 00:38:32.394587 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 17 00:38:32.394844 systemd[1]: Reached target initrd-root-fs.target. May 17 00:38:32.433918 systemd[1]: Mounting sysroot-usr.mount... May 17 00:38:32.439594 systemd[1]: Starting flatcar-metadata-hostname.service... May 17 00:38:32.443812 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 17 00:38:32.443853 systemd[1]: Reached target ignition-diskful.target. May 17 00:38:32.446872 systemd[1]: Mounted sysroot-usr.mount. May 17 00:38:32.515248 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 17 00:38:32.522308 systemd[1]: Starting initrd-setup-root.service... May 17 00:38:32.529997 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (869) May 17 00:38:32.539290 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm May 17 00:38:32.539342 kernel: BTRFS info (device sda6): using free space tree May 17 00:38:32.539356 kernel: BTRFS info (device sda6): has skinny extents May 17 00:38:32.544257 initrd-setup-root[874]: cut: /sysroot/etc/passwd: No such file or directory May 17 00:38:32.550339 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 17 00:38:32.569292 initrd-setup-root[900]: cut: /sysroot/etc/group: No such file or directory May 17 00:38:32.590844 initrd-setup-root[908]: cut: /sysroot/etc/shadow: No such file or directory May 17 00:38:32.597305 initrd-setup-root[916]: cut: /sysroot/etc/gshadow: No such file or directory May 17 00:38:33.358498 systemd[1]: Finished initrd-setup-root.service. May 17 00:38:33.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:33.363905 systemd[1]: Starting ignition-mount.service... May 17 00:38:33.379886 kernel: audit: type=1130 audit(1747442313.362:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:33.376884 systemd[1]: Starting sysroot-boot.service... May 17 00:38:33.383620 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. May 17 00:38:33.385995 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. May 17 00:38:33.406653 systemd[1]: Finished sysroot-boot.service. May 17 00:38:33.421536 kernel: audit: type=1130 audit(1747442313.408:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:33.408000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:33.421629 ignition[936]: INFO : Ignition 2.14.0 May 17 00:38:33.421629 ignition[936]: INFO : Stage: mount May 17 00:38:33.421629 ignition[936]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:38:33.421629 ignition[936]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:38:33.421629 ignition[936]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:38:33.421629 ignition[936]: INFO : mount: mount passed May 17 00:38:33.421629 ignition[936]: INFO : Ignition finished successfully May 17 00:38:33.452989 kernel: audit: type=1130 audit(1747442313.425:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:33.425000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:33.424699 systemd[1]: Finished ignition-mount.service. May 17 00:38:33.994635 coreos-metadata[868]: May 17 00:38:33.994 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 May 17 00:38:34.013238 coreos-metadata[868]: May 17 00:38:34.013 INFO Fetch successful May 17 00:38:34.046326 coreos-metadata[868]: May 17 00:38:34.046 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 May 17 00:38:34.059867 coreos-metadata[868]: May 17 00:38:34.059 INFO Fetch successful May 17 00:38:34.093077 coreos-metadata[868]: May 17 00:38:34.093 INFO wrote hostname ci-3510.3.7-n-332dbccb2e to /sysroot/etc/hostname May 17 00:38:34.098000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:34.095402 systemd[1]: Finished flatcar-metadata-hostname.service. May 17 00:38:34.114561 kernel: audit: type=1130 audit(1747442314.098:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:34.100600 systemd[1]: Starting ignition-files.service... May 17 00:38:34.117976 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 17 00:38:34.130473 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (947) May 17 00:38:34.130521 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm May 17 00:38:34.138168 kernel: BTRFS info (device sda6): using free space tree May 17 00:38:34.138191 kernel: BTRFS info (device sda6): has skinny extents May 17 00:38:34.145975 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 17 00:38:34.159939 ignition[966]: INFO : Ignition 2.14.0 May 17 00:38:34.159939 ignition[966]: INFO : Stage: files May 17 00:38:34.164066 ignition[966]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:38:34.164066 ignition[966]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:38:34.172036 ignition[966]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:38:34.214589 ignition[966]: DEBUG : files: compiled without relabeling support, skipping May 17 00:38:34.218236 ignition[966]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 17 00:38:34.218236 ignition[966]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 17 00:38:34.260580 ignition[966]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 17 00:38:34.264634 ignition[966]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 17 00:38:34.278254 unknown[966]: wrote ssh authorized keys file for user: core May 17 00:38:34.280816 ignition[966]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 17 00:38:34.284292 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" May 17 00:38:34.288137 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" May 17 00:38:34.292093 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" May 17 00:38:34.295961 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 17 00:38:34.299773 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" May 17 00:38:34.305137 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" May 17 00:38:34.311270 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/etc/systemd/system/waagent.service" May 17 00:38:34.315503 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(6): oem config not found in "/usr/share/oem", looking on oem partition May 17 00:38:34.323807 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4005170953" May 17 00:38:34.328081 ignition[966]: CRITICAL : files: createFilesystemsFiles: createFiles: op(6): op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4005170953": device or resource busy May 17 00:38:34.328081 ignition[966]: ERROR : files: createFilesystemsFiles: createFiles: op(6): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem4005170953", trying btrfs: device or resource busy May 17 00:38:34.328081 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4005170953" May 17 00:38:34.343073 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4005170953" May 17 00:38:34.343073 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [started] unmounting "/mnt/oem4005170953" May 17 00:38:34.343073 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [finished] unmounting "/mnt/oem4005170953" May 17 00:38:34.343073 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" May 17 00:38:34.343073 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" May 17 00:38:34.343073 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition May 17 00:38:34.332983 systemd[1]: mnt-oem4005170953.mount: Deactivated successfully. May 17 00:38:34.373414 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3616407531" May 17 00:38:34.377968 ignition[966]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3616407531": device or resource busy May 17 00:38:34.377968 ignition[966]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3616407531", trying btrfs: device or resource busy May 17 00:38:34.377968 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3616407531" May 17 00:38:34.392830 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3616407531" May 17 00:38:34.392830 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem3616407531" May 17 00:38:34.392830 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem3616407531" May 17 00:38:34.392830 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" May 17 00:38:34.392830 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" May 17 00:38:34.392830 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET https://extensions.flatcar.org/extensions/kubernetes-v1.32.4-x86-64.raw: attempt #1 May 17 00:38:34.406190 systemd[1]: mnt-oem3616407531.mount: Deactivated successfully. May 17 00:38:35.210380 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET result: OK May 17 00:38:35.377540 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" May 17 00:38:35.377540 ignition[966]: INFO : files: op(f): [started] processing unit "waagent.service" May 17 00:38:35.377540 ignition[966]: INFO : files: op(f): [finished] processing unit "waagent.service" May 17 00:38:35.390611 ignition[966]: INFO : files: op(10): [started] processing unit "nvidia.service" May 17 00:38:35.390611 ignition[966]: INFO : files: op(10): [finished] processing unit "nvidia.service" May 17 00:38:35.390611 ignition[966]: INFO : files: op(11): [started] setting preset to enabled for "waagent.service" May 17 00:38:35.390611 ignition[966]: INFO : files: op(11): [finished] setting preset to enabled for "waagent.service" May 17 00:38:35.390611 ignition[966]: INFO : files: op(12): [started] setting preset to enabled for "nvidia.service" May 17 00:38:35.390611 ignition[966]: INFO : files: op(12): [finished] setting preset to enabled for "nvidia.service" May 17 00:38:35.390611 ignition[966]: INFO : files: createResultFile: createFiles: op(13): [started] writing file "/sysroot/etc/.ignition-result.json" May 17 00:38:35.390611 ignition[966]: INFO : files: createResultFile: createFiles: op(13): [finished] writing file "/sysroot/etc/.ignition-result.json" May 17 00:38:35.390611 ignition[966]: INFO : files: files passed May 17 00:38:35.390611 ignition[966]: INFO : Ignition finished successfully May 17 00:38:35.442596 kernel: audit: type=1130 audit(1747442315.390:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:35.390000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:35.413000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:35.415000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:35.434000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:35.386940 systemd[1]: Finished ignition-files.service. May 17 00:38:35.392473 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 17 00:38:35.406074 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 17 00:38:35.451727 initrd-setup-root-after-ignition[991]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 17 00:38:35.407064 systemd[1]: Starting ignition-quench.service... May 17 00:38:35.412157 systemd[1]: ignition-quench.service: Deactivated successfully. May 17 00:38:35.412247 systemd[1]: Finished ignition-quench.service. May 17 00:38:35.434374 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 17 00:38:35.437087 systemd[1]: Reached target ignition-complete.target. May 17 00:38:35.439904 systemd[1]: Starting initrd-parse-etc.service... May 17 00:38:35.466000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:35.466000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:35.457725 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 17 00:38:35.457821 systemd[1]: Finished initrd-parse-etc.service. May 17 00:38:35.468661 systemd[1]: Reached target initrd-fs.target. May 17 00:38:35.476007 systemd[1]: Reached target initrd.target. May 17 00:38:35.479478 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 17 00:38:35.483063 systemd[1]: Starting dracut-pre-pivot.service... May 17 00:38:35.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:35.494027 systemd[1]: Finished dracut-pre-pivot.service. May 17 00:38:35.496992 systemd[1]: Starting initrd-cleanup.service... May 17 00:38:35.507555 systemd[1]: Stopped target nss-lookup.target. May 17 00:38:35.509384 systemd[1]: Stopped target remote-cryptsetup.target. May 17 00:38:35.513123 systemd[1]: Stopped target timers.target. May 17 00:38:35.518307 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 17 00:38:35.520606 systemd[1]: Stopped dracut-pre-pivot.service. May 17 00:38:35.524000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:35.524410 systemd[1]: Stopped target initrd.target. May 17 00:38:35.527779 systemd[1]: Stopped target basic.target. May 17 00:38:35.531224 systemd[1]: Stopped target ignition-complete.target. May 17 00:38:35.535085 systemd[1]: Stopped target ignition-diskful.target. May 17 00:38:35.538980 systemd[1]: Stopped target initrd-root-device.target. May 17 00:38:35.543123 systemd[1]: Stopped target remote-fs.target. May 17 00:38:35.546685 systemd[1]: Stopped target remote-fs-pre.target. May 17 00:38:35.550588 systemd[1]: Stopped target sysinit.target. May 17 00:38:35.553959 systemd[1]: Stopped target local-fs.target. May 17 00:38:35.557523 systemd[1]: Stopped target local-fs-pre.target. May 17 00:38:35.561306 systemd[1]: Stopped target swap.target. May 17 00:38:35.564608 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 17 00:38:35.566792 systemd[1]: Stopped dracut-pre-mount.service. May 17 00:38:35.570000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:35.570661 systemd[1]: Stopped target cryptsetup.target. May 17 00:38:35.574324 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 17 00:38:35.576480 systemd[1]: Stopped dracut-initqueue.service. May 17 00:38:35.579000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:35.580152 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 17 00:38:35.582661 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 17 00:38:35.586000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:35.587182 systemd[1]: ignition-files.service: Deactivated successfully. May 17 00:38:35.589230 systemd[1]: Stopped ignition-files.service. May 17 00:38:35.592000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:35.592738 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. May 17 00:38:35.595096 systemd[1]: Stopped flatcar-metadata-hostname.service. May 17 00:38:35.598000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:35.608829 iscsid[813]: iscsid shutting down. May 17 00:38:35.610000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:35.600059 systemd[1]: Stopping ignition-mount.service... May 17 00:38:35.612524 ignition[1004]: INFO : Ignition 2.14.0 May 17 00:38:35.612524 ignition[1004]: INFO : Stage: umount May 17 00:38:35.612524 ignition[1004]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:38:35.612524 ignition[1004]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:38:35.615000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:35.602288 systemd[1]: Stopping iscsid.service... May 17 00:38:35.627802 ignition[1004]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:38:35.627802 ignition[1004]: INFO : umount: umount passed May 17 00:38:35.627802 ignition[1004]: INFO : Ignition finished successfully May 17 00:38:35.604924 systemd[1]: Stopping sysroot-boot.service... May 17 00:38:35.606785 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 17 00:38:35.606975 systemd[1]: Stopped systemd-udev-trigger.service. May 17 00:38:35.610683 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 17 00:38:35.612428 systemd[1]: Stopped dracut-pre-trigger.service. May 17 00:38:35.627429 systemd[1]: iscsid.service: Deactivated successfully. May 17 00:38:35.627543 systemd[1]: Stopped iscsid.service. May 17 00:38:35.647000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:35.647667 systemd[1]: ignition-mount.service: Deactivated successfully. May 17 00:38:35.650000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:35.647841 systemd[1]: Stopped ignition-mount.service. May 17 00:38:35.654000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:35.654000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:35.658000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:35.652023 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 17 00:38:35.652122 systemd[1]: Finished initrd-cleanup.service. May 17 00:38:35.662000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:35.655770 systemd[1]: ignition-disks.service: Deactivated successfully. May 17 00:38:35.666000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:35.670000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:35.655832 systemd[1]: Stopped ignition-disks.service. May 17 00:38:35.658307 systemd[1]: ignition-kargs.service: Deactivated successfully. May 17 00:38:35.658365 systemd[1]: Stopped ignition-kargs.service. May 17 00:38:35.676000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:35.682000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:35.662528 systemd[1]: ignition-fetch.service: Deactivated successfully. May 17 00:38:35.662580 systemd[1]: Stopped ignition-fetch.service. May 17 00:38:35.666177 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 17 00:38:35.666231 systemd[1]: Stopped ignition-fetch-offline.service. May 17 00:38:35.670545 systemd[1]: Stopped target paths.target. May 17 00:38:35.672385 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 17 00:38:35.676520 systemd[1]: Stopped systemd-ask-password-console.path. May 17 00:38:35.676616 systemd[1]: Stopped target slices.target. May 17 00:38:35.676972 systemd[1]: Stopped target sockets.target. May 17 00:38:35.677406 systemd[1]: iscsid.socket: Deactivated successfully. May 17 00:38:35.677458 systemd[1]: Closed iscsid.socket. May 17 00:38:35.677771 systemd[1]: ignition-setup.service: Deactivated successfully. May 17 00:38:35.677812 systemd[1]: Stopped ignition-setup.service. May 17 00:38:35.678256 systemd[1]: Stopping iscsiuio.service... May 17 00:38:35.682836 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 17 00:38:35.683275 systemd[1]: iscsiuio.service: Deactivated successfully. May 17 00:38:35.683377 systemd[1]: Stopped iscsiuio.service. May 17 00:38:35.683653 systemd[1]: Stopped target network.target. May 17 00:38:35.683915 systemd[1]: iscsiuio.socket: Deactivated successfully. May 17 00:38:35.683945 systemd[1]: Closed iscsiuio.socket. May 17 00:38:35.684511 systemd[1]: Stopping systemd-networkd.service... May 17 00:38:35.684693 systemd[1]: Stopping systemd-resolved.service... May 17 00:38:35.697983 systemd[1]: systemd-resolved.service: Deactivated successfully. May 17 00:38:35.698091 systemd[1]: Stopped systemd-resolved.service. May 17 00:38:35.700610 systemd-networkd[805]: eth0: DHCPv6 lease lost May 17 00:38:35.738000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:35.740058 systemd[1]: systemd-networkd.service: Deactivated successfully. May 17 00:38:35.742139 systemd[1]: Stopped systemd-networkd.service. May 17 00:38:35.745000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:35.745000 audit: BPF prog-id=6 op=UNLOAD May 17 00:38:35.746381 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 17 00:38:35.746429 systemd[1]: Closed systemd-networkd.socket. May 17 00:38:35.751000 audit: BPF prog-id=9 op=UNLOAD May 17 00:38:35.752513 systemd[1]: Stopping network-cleanup.service... May 17 00:38:35.756000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:35.756000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:35.754155 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 17 00:38:35.764000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:35.754219 systemd[1]: Stopped parse-ip-for-networkd.service. May 17 00:38:35.756202 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 17 00:38:35.756256 systemd[1]: Stopped systemd-sysctl.service. May 17 00:38:35.759872 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 17 00:38:35.759925 systemd[1]: Stopped systemd-modules-load.service. May 17 00:38:35.764358 systemd[1]: Stopping systemd-udevd.service... May 17 00:38:35.779000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:35.771212 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 17 00:38:35.776538 systemd[1]: systemd-udevd.service: Deactivated successfully. May 17 00:38:35.791000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:35.776711 systemd[1]: Stopped systemd-udevd.service. May 17 00:38:35.791000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:35.791000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:35.791000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:35.802000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:35.804000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:35.780476 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 17 00:38:35.780521 systemd[1]: Closed systemd-udevd-control.socket. May 17 00:38:35.817034 kernel: hv_netvsc 6045bdfb-f30f-6045-bdfb-f30f6045bdfb eth0: Data path switched from VF: enP6049s1 May 17 00:38:35.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:35.810000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:35.784893 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 17 00:38:35.784937 systemd[1]: Closed systemd-udevd-kernel.socket. May 17 00:38:35.789408 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 17 00:38:35.789459 systemd[1]: Stopped dracut-pre-udev.service. May 17 00:38:35.791390 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 17 00:38:35.791436 systemd[1]: Stopped dracut-cmdline.service. May 17 00:38:35.791658 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 17 00:38:35.791696 systemd[1]: Stopped dracut-cmdline-ask.service. May 17 00:38:35.792835 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 17 00:38:35.838000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:35.793156 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. May 17 00:38:35.793213 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. May 17 00:38:35.800503 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 17 00:38:35.800558 systemd[1]: Stopped kmod-static-nodes.service. May 17 00:38:35.803072 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 17 00:38:35.803125 systemd[1]: Stopped systemd-vconsole-setup.service. May 17 00:38:35.805996 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. May 17 00:38:35.806483 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 17 00:38:35.806581 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 17 00:38:35.834572 systemd[1]: network-cleanup.service: Deactivated successfully. May 17 00:38:35.834688 systemd[1]: Stopped network-cleanup.service. May 17 00:38:36.031541 systemd[1]: sysroot-boot.service: Deactivated successfully. May 17 00:38:36.031658 systemd[1]: Stopped sysroot-boot.service. May 17 00:38:36.038000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:36.038369 systemd[1]: Reached target initrd-switch-root.target. May 17 00:38:36.042913 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 17 00:38:36.045238 systemd[1]: Stopped initrd-setup-root.service. May 17 00:38:36.048000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:36.050187 systemd[1]: Starting initrd-switch-root.service... May 17 00:38:36.061309 systemd[1]: Switching root. May 17 00:38:36.082725 systemd-journald[183]: Journal stopped May 17 00:38:51.915569 systemd-journald[183]: Received SIGTERM from PID 1 (systemd). May 17 00:38:51.915600 kernel: SELinux: Class mctp_socket not defined in policy. May 17 00:38:51.915613 kernel: SELinux: Class anon_inode not defined in policy. May 17 00:38:51.915621 kernel: SELinux: the above unknown classes and permissions will be allowed May 17 00:38:51.915632 kernel: SELinux: policy capability network_peer_controls=1 May 17 00:38:51.915642 kernel: SELinux: policy capability open_perms=1 May 17 00:38:51.915655 kernel: SELinux: policy capability extended_socket_class=1 May 17 00:38:51.915666 kernel: SELinux: policy capability always_check_network=0 May 17 00:38:51.915674 kernel: SELinux: policy capability cgroup_seclabel=1 May 17 00:38:51.915685 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 17 00:38:51.915693 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 17 00:38:51.915704 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 17 00:38:51.915714 kernel: kauditd_printk_skb: 43 callbacks suppressed May 17 00:38:51.915724 kernel: audit: type=1403 audit(1747442318.831:82): auid=4294967295 ses=4294967295 lsm=selinux res=1 May 17 00:38:51.915739 systemd[1]: Successfully loaded SELinux policy in 347.342ms. May 17 00:38:51.915753 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 36.213ms. May 17 00:38:51.915763 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 00:38:51.915775 systemd[1]: Detected virtualization microsoft. May 17 00:38:51.915789 systemd[1]: Detected architecture x86-64. May 17 00:38:51.915798 systemd[1]: Detected first boot. May 17 00:38:51.915811 systemd[1]: Hostname set to . May 17 00:38:51.915823 systemd[1]: Initializing machine ID from random generator. May 17 00:38:51.915833 kernel: audit: type=1400 audit(1747442319.779:83): avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 17 00:38:51.915845 kernel: audit: type=1400 audit(1747442319.800:84): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:38:51.915856 kernel: audit: type=1400 audit(1747442319.800:85): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:38:51.915868 kernel: audit: type=1334 audit(1747442319.811:86): prog-id=10 op=LOAD May 17 00:38:51.915878 kernel: audit: type=1334 audit(1747442319.811:87): prog-id=10 op=UNLOAD May 17 00:38:51.915890 kernel: audit: type=1334 audit(1747442319.822:88): prog-id=11 op=LOAD May 17 00:38:51.915898 kernel: audit: type=1334 audit(1747442319.822:89): prog-id=11 op=UNLOAD May 17 00:38:51.915910 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 17 00:38:51.915922 kernel: audit: type=1400 audit(1747442321.386:90): avc: denied { associate } for pid=1039 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 17 00:38:51.915932 kernel: audit: type=1300 audit(1747442321.386:90): arch=c000003e syscall=188 success=yes exit=0 a0=c000024802 a1=c00002aae0 a2=c000028d00 a3=32 items=0 ppid=1022 pid=1039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:51.915946 systemd[1]: Populated /etc with preset unit settings. May 17 00:38:51.915958 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:38:51.915968 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:38:51.915981 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:38:51.915993 kernel: kauditd_printk_skb: 7 callbacks suppressed May 17 00:38:51.916002 kernel: audit: type=1334 audit(1747442331.369:92): prog-id=12 op=LOAD May 17 00:38:51.916013 kernel: audit: type=1334 audit(1747442331.369:93): prog-id=3 op=UNLOAD May 17 00:38:51.916027 kernel: audit: type=1334 audit(1747442331.373:94): prog-id=13 op=LOAD May 17 00:38:51.916039 kernel: audit: type=1334 audit(1747442331.377:95): prog-id=14 op=LOAD May 17 00:38:51.916051 kernel: audit: type=1334 audit(1747442331.377:96): prog-id=4 op=UNLOAD May 17 00:38:51.916063 kernel: audit: type=1334 audit(1747442331.377:97): prog-id=5 op=UNLOAD May 17 00:38:51.916072 kernel: audit: type=1334 audit(1747442331.381:98): prog-id=15 op=LOAD May 17 00:38:51.916084 kernel: audit: type=1334 audit(1747442331.381:99): prog-id=12 op=UNLOAD May 17 00:38:51.916093 kernel: audit: type=1334 audit(1747442331.386:100): prog-id=16 op=LOAD May 17 00:38:51.916101 kernel: audit: type=1334 audit(1747442331.390:101): prog-id=17 op=LOAD May 17 00:38:51.916111 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 17 00:38:51.916125 systemd[1]: Stopped initrd-switch-root.service. May 17 00:38:51.916138 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 17 00:38:51.916150 systemd[1]: Created slice system-addon\x2dconfig.slice. May 17 00:38:51.916161 systemd[1]: Created slice system-addon\x2drun.slice. May 17 00:38:51.916173 systemd[1]: Created slice system-getty.slice. May 17 00:38:51.916184 systemd[1]: Created slice system-modprobe.slice. May 17 00:38:51.916195 systemd[1]: Created slice system-serial\x2dgetty.slice. May 17 00:38:51.916207 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 17 00:38:51.916220 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 17 00:38:51.916232 systemd[1]: Created slice user.slice. May 17 00:38:51.916243 systemd[1]: Started systemd-ask-password-console.path. May 17 00:38:51.916254 systemd[1]: Started systemd-ask-password-wall.path. May 17 00:38:51.916266 systemd[1]: Set up automount boot.automount. May 17 00:38:51.916277 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 17 00:38:51.916289 systemd[1]: Stopped target initrd-switch-root.target. May 17 00:38:51.916301 systemd[1]: Stopped target initrd-fs.target. May 17 00:38:51.916312 systemd[1]: Stopped target initrd-root-fs.target. May 17 00:38:51.916326 systemd[1]: Reached target integritysetup.target. May 17 00:38:51.916338 systemd[1]: Reached target remote-cryptsetup.target. May 17 00:38:51.916350 systemd[1]: Reached target remote-fs.target. May 17 00:38:51.916361 systemd[1]: Reached target slices.target. May 17 00:38:51.916372 systemd[1]: Reached target swap.target. May 17 00:38:51.916385 systemd[1]: Reached target torcx.target. May 17 00:38:51.916396 systemd[1]: Reached target veritysetup.target. May 17 00:38:51.916411 systemd[1]: Listening on systemd-coredump.socket. May 17 00:38:51.916428 systemd[1]: Listening on systemd-initctl.socket. May 17 00:38:51.916460 systemd[1]: Listening on systemd-networkd.socket. May 17 00:38:51.916481 systemd[1]: Listening on systemd-udevd-control.socket. May 17 00:38:51.916501 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 00:38:51.916525 systemd[1]: Listening on systemd-userdbd.socket. May 17 00:38:51.916550 systemd[1]: Mounting dev-hugepages.mount... May 17 00:38:51.916569 systemd[1]: Mounting dev-mqueue.mount... May 17 00:38:51.916590 systemd[1]: Mounting media.mount... May 17 00:38:51.916611 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:38:51.916629 systemd[1]: Mounting sys-kernel-debug.mount... May 17 00:38:51.916647 systemd[1]: Mounting sys-kernel-tracing.mount... May 17 00:38:51.916668 systemd[1]: Mounting tmp.mount... May 17 00:38:51.916685 systemd[1]: Starting flatcar-tmpfiles.service... May 17 00:38:51.916707 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:38:51.916726 systemd[1]: Starting kmod-static-nodes.service... May 17 00:38:51.916746 systemd[1]: Starting modprobe@configfs.service... May 17 00:38:51.916766 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:38:51.916788 systemd[1]: Starting modprobe@drm.service... May 17 00:38:51.916807 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:38:51.916824 systemd[1]: Starting modprobe@fuse.service... May 17 00:38:51.916842 systemd[1]: Starting modprobe@loop.service... May 17 00:38:51.916861 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 17 00:38:51.916889 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 17 00:38:51.916907 systemd[1]: Stopped systemd-fsck-root.service. May 17 00:38:51.916927 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 17 00:38:51.916945 systemd[1]: Stopped systemd-fsck-usr.service. May 17 00:38:51.916963 systemd[1]: Stopped systemd-journald.service. May 17 00:38:51.916983 systemd[1]: Starting systemd-journald.service... May 17 00:38:51.917000 systemd[1]: Starting systemd-modules-load.service... May 17 00:38:51.917021 systemd[1]: Starting systemd-network-generator.service... May 17 00:38:51.917047 kernel: loop: module loaded May 17 00:38:51.917066 systemd[1]: Starting systemd-remount-fs.service... May 17 00:38:51.917084 systemd[1]: Starting systemd-udev-trigger.service... May 17 00:38:51.917102 systemd[1]: verity-setup.service: Deactivated successfully. May 17 00:38:51.917121 systemd[1]: Stopped verity-setup.service. May 17 00:38:51.917140 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:38:51.917158 systemd[1]: Mounted dev-hugepages.mount. May 17 00:38:51.917177 systemd[1]: Mounted dev-mqueue.mount. May 17 00:38:51.917195 kernel: fuse: init (API version 7.34) May 17 00:38:51.917218 systemd[1]: Mounted media.mount. May 17 00:38:51.917235 systemd[1]: Mounted sys-kernel-debug.mount. May 17 00:38:51.917254 systemd[1]: Mounted sys-kernel-tracing.mount. May 17 00:38:51.917272 systemd[1]: Mounted tmp.mount. May 17 00:38:51.917290 systemd[1]: Finished kmod-static-nodes.service. May 17 00:38:51.917312 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 17 00:38:51.917337 systemd[1]: Finished modprobe@configfs.service. May 17 00:38:51.917356 systemd[1]: Finished flatcar-tmpfiles.service. May 17 00:38:51.917370 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:38:51.917385 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:38:51.917401 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 00:38:51.917420 systemd[1]: Finished modprobe@drm.service. May 17 00:38:51.917438 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:38:51.917475 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:38:51.917493 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 17 00:38:51.917510 systemd[1]: Finished modprobe@fuse.service. May 17 00:38:51.917524 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:38:51.917545 systemd-journald[1120]: Journal started May 17 00:38:51.918772 systemd-journald[1120]: Runtime Journal (/run/log/journal/8588a5db1b2c4d28b6e29cfc2b89cc73) is 8.0M, max 159.0M, 151.0M free. May 17 00:38:51.918827 systemd[1]: Finished modprobe@loop.service. May 17 00:38:38.831000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 17 00:38:39.779000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 17 00:38:39.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:38:39.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:38:39.811000 audit: BPF prog-id=10 op=LOAD May 17 00:38:39.811000 audit: BPF prog-id=10 op=UNLOAD May 17 00:38:39.822000 audit: BPF prog-id=11 op=LOAD May 17 00:38:39.822000 audit: BPF prog-id=11 op=UNLOAD May 17 00:38:41.386000 audit[1039]: AVC avc: denied { associate } for pid=1039 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 17 00:38:41.386000 audit[1039]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c000024802 a1=c00002aae0 a2=c000028d00 a3=32 items=0 ppid=1022 pid=1039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:41.386000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:38:41.392000 audit[1039]: AVC avc: denied { associate } for pid=1039 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 17 00:38:41.392000 audit[1039]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0000248d9 a2=1ed a3=0 items=2 ppid=1022 pid=1039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:41.392000 audit: CWD cwd="/" May 17 00:38:41.392000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:38:41.392000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:38:41.392000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:38:51.369000 audit: BPF prog-id=12 op=LOAD May 17 00:38:51.369000 audit: BPF prog-id=3 op=UNLOAD May 17 00:38:51.373000 audit: BPF prog-id=13 op=LOAD May 17 00:38:51.377000 audit: BPF prog-id=14 op=LOAD May 17 00:38:51.377000 audit: BPF prog-id=4 op=UNLOAD May 17 00:38:51.377000 audit: BPF prog-id=5 op=UNLOAD May 17 00:38:51.381000 audit: BPF prog-id=15 op=LOAD May 17 00:38:51.381000 audit: BPF prog-id=12 op=UNLOAD May 17 00:38:51.386000 audit: BPF prog-id=16 op=LOAD May 17 00:38:51.390000 audit: BPF prog-id=17 op=LOAD May 17 00:38:51.390000 audit: BPF prog-id=13 op=UNLOAD May 17 00:38:51.390000 audit: BPF prog-id=14 op=UNLOAD May 17 00:38:51.395000 audit: BPF prog-id=18 op=LOAD May 17 00:38:51.395000 audit: BPF prog-id=15 op=UNLOAD May 17 00:38:51.417000 audit: BPF prog-id=19 op=LOAD May 17 00:38:51.417000 audit: BPF prog-id=20 op=LOAD May 17 00:38:51.417000 audit: BPF prog-id=16 op=UNLOAD May 17 00:38:51.417000 audit: BPF prog-id=17 op=UNLOAD May 17 00:38:51.417000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:51.426000 audit: BPF prog-id=18 op=UNLOAD May 17 00:38:51.428000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:51.428000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:51.727000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:51.735000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:51.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:51.739000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:51.741000 audit: BPF prog-id=21 op=LOAD May 17 00:38:51.741000 audit: BPF prog-id=22 op=LOAD May 17 00:38:51.741000 audit: BPF prog-id=23 op=LOAD May 17 00:38:51.741000 audit: BPF prog-id=19 op=UNLOAD May 17 00:38:51.741000 audit: BPF prog-id=20 op=UNLOAD May 17 00:38:51.801000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:51.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:51.867000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:51.867000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:51.873000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:51.882000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:51.882000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:51.891000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:51.891000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:51.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:51.902000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:51.912000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 17 00:38:51.912000 audit[1120]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7fff4422f690 a2=4000 a3=7fff4422f72c items=0 ppid=1 pid=1120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:51.912000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 17 00:38:51.912000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:51.912000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:41.311052 /usr/lib/systemd/system-generators/torcx-generator[1039]: time="2025-05-17T00:38:41Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:38:51.368020 systemd[1]: Queued start job for default target multi-user.target. May 17 00:38:41.330310 /usr/lib/systemd/system-generators/torcx-generator[1039]: time="2025-05-17T00:38:41Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 17 00:38:51.368033 systemd[1]: Unnecessary job was removed for dev-sda6.device. May 17 00:38:41.330350 /usr/lib/systemd/system-generators/torcx-generator[1039]: time="2025-05-17T00:38:41Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 17 00:38:51.418039 systemd[1]: systemd-journald.service: Deactivated successfully. May 17 00:38:41.330394 /usr/lib/systemd/system-generators/torcx-generator[1039]: time="2025-05-17T00:38:41Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 17 00:38:41.330414 /usr/lib/systemd/system-generators/torcx-generator[1039]: time="2025-05-17T00:38:41Z" level=debug msg="skipped missing lower profile" missing profile=oem May 17 00:38:41.330498 /usr/lib/systemd/system-generators/torcx-generator[1039]: time="2025-05-17T00:38:41Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 17 00:38:41.330517 /usr/lib/systemd/system-generators/torcx-generator[1039]: time="2025-05-17T00:38:41Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 17 00:38:41.330768 /usr/lib/systemd/system-generators/torcx-generator[1039]: time="2025-05-17T00:38:41Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 17 00:38:41.330808 /usr/lib/systemd/system-generators/torcx-generator[1039]: time="2025-05-17T00:38:41Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 17 00:38:41.330827 /usr/lib/systemd/system-generators/torcx-generator[1039]: time="2025-05-17T00:38:41Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 17 00:38:41.368349 /usr/lib/systemd/system-generators/torcx-generator[1039]: time="2025-05-17T00:38:41Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 17 00:38:41.368424 /usr/lib/systemd/system-generators/torcx-generator[1039]: time="2025-05-17T00:38:41Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 17 00:38:41.368507 /usr/lib/systemd/system-generators/torcx-generator[1039]: time="2025-05-17T00:38:41Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 17 00:38:41.368529 /usr/lib/systemd/system-generators/torcx-generator[1039]: time="2025-05-17T00:38:41Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 17 00:38:41.368565 /usr/lib/systemd/system-generators/torcx-generator[1039]: time="2025-05-17T00:38:41Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 17 00:38:41.368582 /usr/lib/systemd/system-generators/torcx-generator[1039]: time="2025-05-17T00:38:41Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 17 00:38:50.039815 /usr/lib/systemd/system-generators/torcx-generator[1039]: time="2025-05-17T00:38:50Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:38:50.040050 /usr/lib/systemd/system-generators/torcx-generator[1039]: time="2025-05-17T00:38:50Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:38:50.040173 /usr/lib/systemd/system-generators/torcx-generator[1039]: time="2025-05-17T00:38:50Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:38:50.040339 /usr/lib/systemd/system-generators/torcx-generator[1039]: time="2025-05-17T00:38:50Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:38:50.040385 /usr/lib/systemd/system-generators/torcx-generator[1039]: time="2025-05-17T00:38:50Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 17 00:38:50.040439 /usr/lib/systemd/system-generators/torcx-generator[1039]: time="2025-05-17T00:38:50Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 17 00:38:51.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:51.922000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:51.927952 systemd[1]: Started systemd-journald.service. May 17 00:38:51.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:51.928958 systemd[1]: Finished systemd-modules-load.service. May 17 00:38:51.930000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:51.931434 systemd[1]: Finished systemd-network-generator.service. May 17 00:38:51.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:51.934025 systemd[1]: Finished systemd-remount-fs.service. May 17 00:38:51.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:51.936775 systemd[1]: Reached target network-pre.target. May 17 00:38:51.940440 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 17 00:38:51.943931 systemd[1]: Mounting sys-kernel-config.mount... May 17 00:38:51.949444 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 17 00:38:51.968044 systemd[1]: Starting systemd-hwdb-update.service... May 17 00:38:51.971842 systemd[1]: Starting systemd-journal-flush.service... May 17 00:38:51.973875 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:38:51.975369 systemd[1]: Starting systemd-random-seed.service... May 17 00:38:51.977191 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:38:51.978975 systemd[1]: Starting systemd-sysctl.service... May 17 00:38:51.982144 systemd[1]: Starting systemd-sysusers.service... May 17 00:38:51.987278 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 17 00:38:51.989587 systemd[1]: Mounted sys-kernel-config.mount. May 17 00:38:52.005616 systemd[1]: Finished systemd-udev-trigger.service. May 17 00:38:52.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:52.009596 systemd[1]: Starting systemd-udev-settle.service... May 17 00:38:52.018464 systemd-journald[1120]: Time spent on flushing to /var/log/journal/8588a5db1b2c4d28b6e29cfc2b89cc73 is 22.386ms for 1149 entries. May 17 00:38:52.018464 systemd-journald[1120]: System Journal (/var/log/journal/8588a5db1b2c4d28b6e29cfc2b89cc73) is 8.0M, max 2.6G, 2.6G free. May 17 00:38:52.108037 systemd-journald[1120]: Received client request to flush runtime journal. May 17 00:38:52.034000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:52.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:52.108265 udevadm[1162]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. May 17 00:38:52.031551 systemd[1]: Finished systemd-random-seed.service. May 17 00:38:52.034710 systemd[1]: Reached target first-boot-complete.target. May 17 00:38:52.057250 systemd[1]: Finished systemd-sysctl.service. May 17 00:38:52.109267 systemd[1]: Finished systemd-journal-flush.service. May 17 00:38:52.111000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:52.760513 systemd[1]: Finished systemd-sysusers.service. May 17 00:38:52.762000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:52.764897 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 17 00:38:53.078828 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 17 00:38:53.080000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:53.299530 systemd[1]: Finished systemd-hwdb-update.service. May 17 00:38:53.301000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:53.301000 audit: BPF prog-id=24 op=LOAD May 17 00:38:53.301000 audit: BPF prog-id=25 op=LOAD May 17 00:38:53.301000 audit: BPF prog-id=7 op=UNLOAD May 17 00:38:53.301000 audit: BPF prog-id=8 op=UNLOAD May 17 00:38:53.303175 systemd[1]: Starting systemd-udevd.service... May 17 00:38:53.321574 systemd-udevd[1167]: Using default interface naming scheme 'v252'. May 17 00:38:53.595516 systemd[1]: Started systemd-udevd.service. May 17 00:38:53.597000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:53.598000 audit: BPF prog-id=26 op=LOAD May 17 00:38:53.600107 systemd[1]: Starting systemd-networkd.service... May 17 00:38:53.637540 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 17 00:38:53.705000 audit: BPF prog-id=27 op=LOAD May 17 00:38:53.705000 audit: BPF prog-id=28 op=LOAD May 17 00:38:53.705000 audit: BPF prog-id=29 op=LOAD May 17 00:38:53.707153 systemd[1]: Starting systemd-userdbd.service... May 17 00:38:53.726496 kernel: hv_vmbus: registering driver hyperv_fb May 17 00:38:53.728000 audit[1172]: AVC avc: denied { confidentiality } for pid=1172 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 17 00:38:53.735468 kernel: hv_vmbus: registering driver hv_balloon May 17 00:38:53.768425 kernel: hyperv_fb: Synthvid Version major 3, minor 5 May 17 00:38:53.768567 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 May 17 00:38:53.768594 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 May 17 00:38:53.772925 systemd[1]: Started systemd-userdbd.service. May 17 00:38:53.774000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:53.779331 kernel: Console: switching to colour dummy device 80x25 May 17 00:38:53.787107 kernel: Console: switching to colour frame buffer device 128x48 May 17 00:38:53.728000 audit[1172]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55d8a16e8030 a1=f884 a2=7f23664fbbc5 a3=5 items=12 ppid=1167 pid=1172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:53.728000 audit: CWD cwd="/" May 17 00:38:53.728000 audit: PATH item=0 name=(null) inode=1237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:38:53.728000 audit: PATH item=1 name=(null) inode=14977 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:38:53.728000 audit: PATH item=2 name=(null) inode=14977 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:38:53.728000 audit: PATH item=3 name=(null) inode=14978 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:38:53.728000 audit: PATH item=4 name=(null) inode=14977 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:38:53.728000 audit: PATH item=5 name=(null) inode=14979 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:38:53.728000 audit: PATH item=6 name=(null) inode=14977 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:38:53.728000 audit: PATH item=7 name=(null) inode=14980 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:38:53.728000 audit: PATH item=8 name=(null) inode=14977 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:38:53.728000 audit: PATH item=9 name=(null) inode=14981 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:38:53.728000 audit: PATH item=10 name=(null) inode=14977 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:38:53.728000 audit: PATH item=11 name=(null) inode=14982 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:38:53.728000 audit: PROCTITLE proctitle="(udev-worker)" May 17 00:38:53.808484 kernel: mousedev: PS/2 mouse device common for all mice May 17 00:38:53.817696 kernel: hv_utils: Registering HyperV Utility Driver May 17 00:38:53.817790 kernel: hv_vmbus: registering driver hv_utils May 17 00:38:53.835013 kernel: hv_utils: Heartbeat IC version 3.0 May 17 00:38:53.835101 kernel: hv_utils: Shutdown IC version 3.2 May 17 00:38:53.835127 kernel: hv_utils: TimeSync IC version 4.0 May 17 00:38:54.823714 kernel: KVM: vmx: using Hyper-V Enlightened VMCS May 17 00:38:54.838515 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 00:38:54.859973 systemd[1]: Finished systemd-udev-settle.service. May 17 00:38:54.861000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:54.863544 systemd[1]: Starting lvm2-activation-early.service... May 17 00:38:54.874493 systemd-networkd[1173]: lo: Link UP May 17 00:38:54.874505 systemd-networkd[1173]: lo: Gained carrier May 17 00:38:54.875113 systemd-networkd[1173]: Enumeration completed May 17 00:38:54.875253 systemd[1]: Started systemd-networkd.service. May 17 00:38:54.876000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:54.878890 systemd[1]: Starting systemd-networkd-wait-online.service... May 17 00:38:54.906441 systemd-networkd[1173]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 00:38:54.958599 kernel: mlx5_core 17a1:00:02.0 enP6049s1: Link up May 17 00:38:54.977587 kernel: hv_netvsc 6045bdfb-f30f-6045-bdfb-f30f6045bdfb eth0: Data path switched to VF: enP6049s1 May 17 00:38:54.978227 systemd-networkd[1173]: enP6049s1: Link UP May 17 00:38:54.978508 systemd-networkd[1173]: eth0: Link UP May 17 00:38:54.978599 systemd-networkd[1173]: eth0: Gained carrier May 17 00:38:54.983891 systemd-networkd[1173]: enP6049s1: Gained carrier May 17 00:38:55.009740 systemd-networkd[1173]: eth0: DHCPv4 address 10.200.4.18/24, gateway 10.200.4.1 acquired from 168.63.129.16 May 17 00:38:55.416895 lvm[1243]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 00:38:55.466778 systemd[1]: Finished lvm2-activation-early.service. May 17 00:38:55.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:55.469653 systemd[1]: Reached target cryptsetup.target. May 17 00:38:55.473056 systemd[1]: Starting lvm2-activation.service... May 17 00:38:55.479508 lvm[1245]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 00:38:55.501810 systemd[1]: Finished lvm2-activation.service. May 17 00:38:55.503000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:55.504420 systemd[1]: Reached target local-fs-pre.target. May 17 00:38:55.506801 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 17 00:38:55.506843 systemd[1]: Reached target local-fs.target. May 17 00:38:55.508837 systemd[1]: Reached target machines.target. May 17 00:38:55.512123 systemd[1]: Starting ldconfig.service... May 17 00:38:55.541941 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:38:55.542057 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:38:55.543686 systemd[1]: Starting systemd-boot-update.service... May 17 00:38:55.547788 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 17 00:38:55.551922 systemd[1]: Starting systemd-machine-id-commit.service... May 17 00:38:55.555430 systemd[1]: Starting systemd-sysext.service... May 17 00:38:56.068000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:56.061889 systemd-networkd[1173]: eth0: Gained IPv6LL May 17 00:38:56.068562 systemd[1]: Finished systemd-networkd-wait-online.service. May 17 00:38:56.077076 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1247 (bootctl) May 17 00:38:56.078976 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 17 00:38:56.086448 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 17 00:38:56.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:56.150971 systemd[1]: Unmounting usr-share-oem.mount... May 17 00:38:56.201121 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 17 00:38:56.201342 systemd[1]: Unmounted usr-share-oem.mount. May 17 00:38:56.252590 kernel: loop0: detected capacity change from 0 to 224512 May 17 00:38:56.257933 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 17 00:38:56.259000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:56.259657 systemd[1]: Finished systemd-machine-id-commit.service. May 17 00:38:56.315596 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 17 00:38:56.331596 kernel: loop1: detected capacity change from 0 to 224512 May 17 00:38:56.336141 (sd-sysext)[1260]: Using extensions 'kubernetes'. May 17 00:38:56.336645 (sd-sysext)[1260]: Merged extensions into '/usr'. May 17 00:38:56.352788 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:38:56.354414 systemd[1]: Mounting usr-share-oem.mount... May 17 00:38:56.354851 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:38:56.358745 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:38:56.366000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:56.366000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:56.367000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:56.367000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:56.375000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:56.361047 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:38:56.364688 systemd[1]: Starting modprobe@loop.service... May 17 00:38:56.364855 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:38:56.364999 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:38:56.365141 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:38:56.366356 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:38:56.366661 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:38:56.367192 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:38:56.367336 systemd[1]: Finished modprobe@loop.service. May 17 00:38:56.368003 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:38:56.374741 systemd[1]: Mounted usr-share-oem.mount. May 17 00:38:56.375906 systemd[1]: Finished systemd-sysext.service. May 17 00:38:56.378289 systemd[1]: Starting ensure-sysext.service... May 17 00:38:56.386000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:56.386000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:56.385802 systemd[1]: Starting systemd-tmpfiles-setup.service... May 17 00:38:56.386490 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:38:56.386711 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:38:56.387065 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:38:56.389597 systemd[1]: Reloading. May 17 00:38:56.447155 systemd-tmpfiles[1267]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 17 00:38:56.465050 systemd-tmpfiles[1267]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 17 00:38:56.471938 /usr/lib/systemd/system-generators/torcx-generator[1287]: time="2025-05-17T00:38:56Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:38:56.471971 /usr/lib/systemd/system-generators/torcx-generator[1287]: time="2025-05-17T00:38:56Z" level=info msg="torcx already run" May 17 00:38:56.483721 systemd-tmpfiles[1267]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 17 00:38:56.563804 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:38:56.563827 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:38:56.580742 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:38:56.647000 audit: BPF prog-id=30 op=LOAD May 17 00:38:56.647000 audit: BPF prog-id=21 op=UNLOAD May 17 00:38:56.648000 audit: BPF prog-id=31 op=LOAD May 17 00:38:56.648000 audit: BPF prog-id=32 op=LOAD May 17 00:38:56.648000 audit: BPF prog-id=22 op=UNLOAD May 17 00:38:56.648000 audit: BPF prog-id=23 op=UNLOAD May 17 00:38:56.648000 audit: BPF prog-id=33 op=LOAD May 17 00:38:56.649000 audit: BPF prog-id=27 op=UNLOAD May 17 00:38:56.649000 audit: BPF prog-id=34 op=LOAD May 17 00:38:56.649000 audit: BPF prog-id=35 op=LOAD May 17 00:38:56.649000 audit: BPF prog-id=28 op=UNLOAD May 17 00:38:56.649000 audit: BPF prog-id=29 op=UNLOAD May 17 00:38:56.649000 audit: BPF prog-id=36 op=LOAD May 17 00:38:56.649000 audit: BPF prog-id=37 op=LOAD May 17 00:38:56.649000 audit: BPF prog-id=24 op=UNLOAD May 17 00:38:56.649000 audit: BPF prog-id=25 op=UNLOAD May 17 00:38:56.650000 audit: BPF prog-id=38 op=LOAD May 17 00:38:56.650000 audit: BPF prog-id=26 op=UNLOAD May 17 00:38:56.665429 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:38:56.665780 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:38:56.667682 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:38:56.670031 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:38:56.672219 systemd[1]: Starting modprobe@loop.service... May 17 00:38:56.672393 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:38:56.672640 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:38:56.672866 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:38:56.681751 systemd[1]: Finished ensure-sysext.service. May 17 00:38:56.681000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:56.682000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:56.682000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:56.683000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:56.683000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:56.682253 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:38:56.682376 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:38:56.683111 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:38:56.683222 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:38:56.684963 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:38:56.685222 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:38:56.687368 systemd[1]: Starting modprobe@drm.service... May 17 00:38:56.687669 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:38:56.687760 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:38:56.687844 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:38:56.687933 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:38:56.690137 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:38:56.690326 systemd[1]: Finished modprobe@loop.service. May 17 00:38:56.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:56.689000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:56.690623 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:38:56.692000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:56.692000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:56.692414 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 00:38:56.692605 systemd[1]: Finished modprobe@drm.service. May 17 00:38:56.933886 systemd-fsck[1255]: fsck.fat 4.2 (2021-01-31) May 17 00:38:56.933886 systemd-fsck[1255]: /dev/sda1: 790 files, 120726/258078 clusters May 17 00:38:56.935518 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 17 00:38:56.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:56.939982 systemd[1]: Mounting boot.mount... May 17 00:38:56.954236 systemd[1]: Mounted boot.mount. May 17 00:38:56.970294 systemd[1]: Finished systemd-boot-update.service. May 17 00:38:56.972000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:57.171136 systemd[1]: Finished systemd-tmpfiles-setup.service. May 17 00:38:57.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:57.176052 systemd[1]: Starting audit-rules.service... May 17 00:38:57.176911 kernel: kauditd_printk_skb: 119 callbacks suppressed May 17 00:38:57.176975 kernel: audit: type=1130 audit(1747442337.173:204): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:57.189667 systemd[1]: Starting clean-ca-certificates.service... May 17 00:38:57.193266 systemd[1]: Starting systemd-journal-catalog-update.service... May 17 00:38:57.196000 audit: BPF prog-id=39 op=LOAD May 17 00:38:57.198307 systemd[1]: Starting systemd-resolved.service... May 17 00:38:57.201582 kernel: audit: type=1334 audit(1747442337.196:205): prog-id=39 op=LOAD May 17 00:38:57.209460 kernel: audit: type=1334 audit(1747442337.204:206): prog-id=40 op=LOAD May 17 00:38:57.204000 audit: BPF prog-id=40 op=LOAD May 17 00:38:57.205781 systemd[1]: Starting systemd-timesyncd.service... May 17 00:38:57.211486 systemd[1]: Starting systemd-update-utmp.service... May 17 00:38:57.242896 kernel: audit: type=1127 audit(1747442337.231:207): pid=1364 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 17 00:38:57.231000 audit[1364]: SYSTEM_BOOT pid=1364 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 17 00:38:57.247853 systemd[1]: Finished systemd-update-utmp.service. May 17 00:38:57.260632 kernel: audit: type=1130 audit(1747442337.249:208): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:57.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:57.285717 systemd[1]: Finished clean-ca-certificates.service. May 17 00:38:57.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:57.288255 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 00:38:57.300597 kernel: audit: type=1130 audit(1747442337.287:209): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:57.367847 systemd[1]: Started systemd-timesyncd.service. May 17 00:38:57.369000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:57.370231 systemd[1]: Reached target time-set.target. May 17 00:38:57.382799 kernel: audit: type=1130 audit(1747442337.369:210): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:57.416146 systemd-resolved[1361]: Positive Trust Anchors: May 17 00:38:57.416166 systemd-resolved[1361]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 00:38:57.416206 systemd-resolved[1361]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 00:38:57.442690 systemd[1]: Finished systemd-journal-catalog-update.service. May 17 00:38:57.445000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:57.459594 kernel: audit: type=1130 audit(1747442337.445:211): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:57.498491 systemd-timesyncd[1363]: Contacted time server 132.226.210.133:123 (0.flatcar.pool.ntp.org). May 17 00:38:57.498658 systemd-timesyncd[1363]: Initial clock synchronization to Sat 2025-05-17 00:38:57.498260 UTC. May 17 00:38:57.606120 systemd-resolved[1361]: Using system hostname 'ci-3510.3.7-n-332dbccb2e'. May 17 00:38:57.607912 systemd[1]: Started systemd-resolved.service. May 17 00:38:57.609000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:57.610372 systemd[1]: Reached target network.target. May 17 00:38:57.625529 kernel: audit: type=1130 audit(1747442337.609:212): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:57.625919 systemd[1]: Reached target network-online.target. May 17 00:38:57.628138 systemd[1]: Reached target nss-lookup.target. May 17 00:38:57.653000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 17 00:38:57.655475 systemd[1]: Finished audit-rules.service. May 17 00:38:57.655891 augenrules[1379]: No rules May 17 00:38:57.653000 audit[1379]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe5a64b2a0 a2=420 a3=0 items=0 ppid=1358 pid=1379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:57.653000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 17 00:38:57.662587 kernel: audit: type=1305 audit(1747442337.653:213): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 17 00:39:04.291249 ldconfig[1246]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 17 00:39:04.302881 systemd[1]: Finished ldconfig.service. May 17 00:39:04.306754 systemd[1]: Starting systemd-update-done.service... May 17 00:39:04.313934 systemd[1]: Finished systemd-update-done.service. May 17 00:39:04.316238 systemd[1]: Reached target sysinit.target. May 17 00:39:04.318128 systemd[1]: Started motdgen.path. May 17 00:39:04.319660 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 17 00:39:04.322483 systemd[1]: Started logrotate.timer. May 17 00:39:04.324169 systemd[1]: Started mdadm.timer. May 17 00:39:04.325649 systemd[1]: Started systemd-tmpfiles-clean.timer. May 17 00:39:04.327550 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 17 00:39:04.327587 systemd[1]: Reached target paths.target. May 17 00:39:04.329394 systemd[1]: Reached target timers.target. May 17 00:39:04.331475 systemd[1]: Listening on dbus.socket. May 17 00:39:04.334344 systemd[1]: Starting docker.socket... May 17 00:39:04.338699 systemd[1]: Listening on sshd.socket. May 17 00:39:04.340721 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:39:04.341191 systemd[1]: Listening on docker.socket. May 17 00:39:04.343283 systemd[1]: Reached target sockets.target. May 17 00:39:04.345645 systemd[1]: Reached target basic.target. May 17 00:39:04.347623 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 00:39:04.347661 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 00:39:04.348858 systemd[1]: Starting containerd.service... May 17 00:39:04.351841 systemd[1]: Starting dbus.service... May 17 00:39:04.354452 systemd[1]: Starting enable-oem-cloudinit.service... May 17 00:39:04.357766 systemd[1]: Starting extend-filesystems.service... May 17 00:39:04.360082 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 17 00:39:04.361732 systemd[1]: Starting kubelet.service... May 17 00:39:04.366351 systemd[1]: Starting motdgen.service... May 17 00:39:04.369295 systemd[1]: Started nvidia.service. May 17 00:39:04.372638 systemd[1]: Starting ssh-key-proc-cmdline.service... May 17 00:39:04.375742 systemd[1]: Starting sshd-keygen.service... May 17 00:39:04.380880 systemd[1]: Starting systemd-logind.service... May 17 00:39:04.382666 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:39:04.382765 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 17 00:39:04.383301 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 17 00:39:04.384179 systemd[1]: Starting update-engine.service... May 17 00:39:04.387415 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 17 00:39:04.398915 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 17 00:39:04.399141 systemd[1]: Finished ssh-key-proc-cmdline.service. May 17 00:39:04.440940 systemd[1]: motdgen.service: Deactivated successfully. May 17 00:39:04.441182 systemd[1]: Finished motdgen.service. May 17 00:39:04.476942 jq[1389]: false May 17 00:39:04.476716 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 17 00:39:04.476957 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 17 00:39:04.479823 jq[1400]: true May 17 00:39:04.487473 env[1411]: time="2025-05-17T00:39:04.487421672Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 17 00:39:04.495458 extend-filesystems[1390]: Found loop1 May 17 00:39:04.497725 extend-filesystems[1390]: Found sda May 17 00:39:04.497725 extend-filesystems[1390]: Found sda1 May 17 00:39:04.497725 extend-filesystems[1390]: Found sda2 May 17 00:39:04.497725 extend-filesystems[1390]: Found sda3 May 17 00:39:04.497725 extend-filesystems[1390]: Found usr May 17 00:39:04.497725 extend-filesystems[1390]: Found sda4 May 17 00:39:04.497725 extend-filesystems[1390]: Found sda6 May 17 00:39:04.497725 extend-filesystems[1390]: Found sda7 May 17 00:39:04.497725 extend-filesystems[1390]: Found sda9 May 17 00:39:04.497725 extend-filesystems[1390]: Checking size of /dev/sda9 May 17 00:39:04.531459 jq[1423]: true May 17 00:39:04.551931 systemd-logind[1398]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 17 00:39:04.557186 env[1411]: time="2025-05-17T00:39:04.557130784Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 17 00:39:04.557513 env[1411]: time="2025-05-17T00:39:04.557485891Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 17 00:39:04.559748 env[1411]: time="2025-05-17T00:39:04.559664132Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.182-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 17 00:39:04.559758 systemd-logind[1398]: New seat seat0. May 17 00:39:04.560013 env[1411]: time="2025-05-17T00:39:04.559989638Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 17 00:39:04.560382 env[1411]: time="2025-05-17T00:39:04.560352945Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 00:39:04.560478 env[1411]: time="2025-05-17T00:39:04.560463347Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 17 00:39:04.560545 env[1411]: time="2025-05-17T00:39:04.560530448Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 17 00:39:04.560656 env[1411]: time="2025-05-17T00:39:04.560641550Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 17 00:39:04.560810 env[1411]: time="2025-05-17T00:39:04.560796053Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 17 00:39:04.561078 env[1411]: time="2025-05-17T00:39:04.561059458Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 17 00:39:04.561372 env[1411]: time="2025-05-17T00:39:04.561346563Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 00:39:04.561454 env[1411]: time="2025-05-17T00:39:04.561439365Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 17 00:39:04.561600 env[1411]: time="2025-05-17T00:39:04.561561167Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 17 00:39:04.561685 env[1411]: time="2025-05-17T00:39:04.561672970Z" level=info msg="metadata content store policy set" policy=shared May 17 00:39:04.596582 env[1411]: time="2025-05-17T00:39:04.596524425Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 17 00:39:04.598237 env[1411]: time="2025-05-17T00:39:04.596761130Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 17 00:39:04.598237 env[1411]: time="2025-05-17T00:39:04.597059335Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 17 00:39:04.598237 env[1411]: time="2025-05-17T00:39:04.597224739Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 17 00:39:04.598237 env[1411]: time="2025-05-17T00:39:04.597251839Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 17 00:39:04.598237 env[1411]: time="2025-05-17T00:39:04.597270939Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 17 00:39:04.598237 env[1411]: time="2025-05-17T00:39:04.597287240Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 17 00:39:04.598237 env[1411]: time="2025-05-17T00:39:04.597304740Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 17 00:39:04.598237 env[1411]: time="2025-05-17T00:39:04.597326040Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 17 00:39:04.598237 env[1411]: time="2025-05-17T00:39:04.597344241Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 17 00:39:04.598237 env[1411]: time="2025-05-17T00:39:04.597362041Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 17 00:39:04.598237 env[1411]: time="2025-05-17T00:39:04.597378941Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 17 00:39:04.598237 env[1411]: time="2025-05-17T00:39:04.597517444Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 17 00:39:04.598237 env[1411]: time="2025-05-17T00:39:04.597627546Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 17 00:39:04.598237 env[1411]: time="2025-05-17T00:39:04.597954352Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 17 00:39:04.598809 env[1411]: time="2025-05-17T00:39:04.597989453Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 17 00:39:04.598809 env[1411]: time="2025-05-17T00:39:04.598007153Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 17 00:39:04.598809 env[1411]: time="2025-05-17T00:39:04.598122555Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 17 00:39:04.598809 env[1411]: time="2025-05-17T00:39:04.598142656Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 17 00:39:04.598809 env[1411]: time="2025-05-17T00:39:04.598160056Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 17 00:39:04.598809 env[1411]: time="2025-05-17T00:39:04.598245458Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 17 00:39:04.598809 env[1411]: time="2025-05-17T00:39:04.598267158Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 17 00:39:04.598809 env[1411]: time="2025-05-17T00:39:04.598283258Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 17 00:39:04.598809 env[1411]: time="2025-05-17T00:39:04.598298659Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 17 00:39:04.598809 env[1411]: time="2025-05-17T00:39:04.598315359Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 17 00:39:04.598809 env[1411]: time="2025-05-17T00:39:04.598334759Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 17 00:39:04.598809 env[1411]: time="2025-05-17T00:39:04.598484762Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 17 00:39:04.598809 env[1411]: time="2025-05-17T00:39:04.598504263Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 17 00:39:04.598809 env[1411]: time="2025-05-17T00:39:04.598524163Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 17 00:39:04.598809 env[1411]: time="2025-05-17T00:39:04.598540763Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 17 00:39:04.599306 env[1411]: time="2025-05-17T00:39:04.598575864Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 17 00:39:04.599306 env[1411]: time="2025-05-17T00:39:04.598591664Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 17 00:39:04.599306 env[1411]: time="2025-05-17T00:39:04.598617465Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 17 00:39:04.599306 env[1411]: time="2025-05-17T00:39:04.598659066Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 17 00:39:04.599450 env[1411]: time="2025-05-17T00:39:04.598946371Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 17 00:39:04.599450 env[1411]: time="2025-05-17T00:39:04.599021372Z" level=info msg="Connect containerd service" May 17 00:39:04.599450 env[1411]: time="2025-05-17T00:39:04.599059973Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 17 00:39:04.668621 env[1411]: time="2025-05-17T00:39:04.599792087Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 17 00:39:04.668621 env[1411]: time="2025-05-17T00:39:04.600095993Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 17 00:39:04.668621 env[1411]: time="2025-05-17T00:39:04.600140093Z" level=info msg=serving... address=/run/containerd/containerd.sock May 17 00:39:04.668621 env[1411]: time="2025-05-17T00:39:04.600192394Z" level=info msg="containerd successfully booted in 0.116969s" May 17 00:39:04.668621 env[1411]: time="2025-05-17T00:39:04.600636903Z" level=info msg="Start subscribing containerd event" May 17 00:39:04.668621 env[1411]: time="2025-05-17T00:39:04.600683304Z" level=info msg="Start recovering state" May 17 00:39:04.668621 env[1411]: time="2025-05-17T00:39:04.600739905Z" level=info msg="Start event monitor" May 17 00:39:04.668621 env[1411]: time="2025-05-17T00:39:04.600753705Z" level=info msg="Start snapshots syncer" May 17 00:39:04.668621 env[1411]: time="2025-05-17T00:39:04.600764005Z" level=info msg="Start cni network conf syncer for default" May 17 00:39:04.668621 env[1411]: time="2025-05-17T00:39:04.600771905Z" level=info msg="Start streaming server" May 17 00:39:04.669008 extend-filesystems[1390]: Old size kept for /dev/sda9 May 17 00:39:04.669008 extend-filesystems[1390]: Found sr0 May 17 00:39:04.600289 systemd[1]: Started containerd.service. May 17 00:39:04.610713 systemd[1]: extend-filesystems.service: Deactivated successfully. May 17 00:39:04.620939 systemd[1]: Finished extend-filesystems.service. May 17 00:39:04.703873 bash[1442]: Updated "/home/core/.ssh/authorized_keys" May 17 00:39:04.704933 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 17 00:39:04.732938 dbus-daemon[1388]: [system] SELinux support is enabled May 17 00:39:04.733595 systemd[1]: Started dbus.service. May 17 00:39:04.738198 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 17 00:39:04.738234 systemd[1]: Reached target system-config.target. May 17 00:39:04.740806 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 17 00:39:04.740830 systemd[1]: Reached target user-config.target. May 17 00:39:04.744102 systemd[1]: Started systemd-logind.service. May 17 00:39:04.747267 dbus-daemon[1388]: [system] Successfully activated service 'org.freedesktop.systemd1' May 17 00:39:04.772006 systemd[1]: nvidia.service: Deactivated successfully. May 17 00:39:05.695933 systemd[1]: Started kubelet.service. May 17 00:39:05.878698 update_engine[1399]: I0517 00:39:05.858220 1399 main.cc:92] Flatcar Update Engine starting May 17 00:39:05.932216 systemd[1]: Started update-engine.service. May 17 00:39:05.934345 update_engine[1399]: I0517 00:39:05.932646 1399 update_check_scheduler.cc:74] Next update check in 8m11s May 17 00:39:05.937252 systemd[1]: Started locksmithd.service. May 17 00:39:06.217253 sshd_keygen[1408]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 17 00:39:06.248868 systemd[1]: Finished sshd-keygen.service. May 17 00:39:06.253201 systemd[1]: Starting issuegen.service... May 17 00:39:06.257166 systemd[1]: Started waagent.service. May 17 00:39:06.270649 systemd[1]: issuegen.service: Deactivated successfully. May 17 00:39:06.270861 systemd[1]: Finished issuegen.service. May 17 00:39:06.275330 systemd[1]: Starting systemd-user-sessions.service... May 17 00:39:06.304657 systemd[1]: Finished systemd-user-sessions.service. May 17 00:39:06.308821 systemd[1]: Started getty@tty1.service. May 17 00:39:06.312383 systemd[1]: Started serial-getty@ttyS0.service. May 17 00:39:06.314813 systemd[1]: Reached target getty.target. May 17 00:39:06.316810 systemd[1]: Reached target multi-user.target. May 17 00:39:06.320484 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 17 00:39:06.333218 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 17 00:39:06.333421 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 17 00:39:06.335990 systemd[1]: Startup finished in 837ms (firmware) + 31.706s (loader) + 879ms (kernel) + 14.460s (initrd) + 27.387s (userspace) = 1min 15.272s. May 17 00:39:06.357781 kubelet[1494]: E0517 00:39:06.357743 1494 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:39:06.359421 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:39:06.359594 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:39:06.359835 systemd[1]: kubelet.service: Consumed 1.179s CPU time. May 17 00:39:06.860262 login[1515]: pam_lastlog(login:session): file /var/log/lastlog is locked/write May 17 00:39:06.879149 login[1514]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) May 17 00:39:07.104346 systemd[1]: Created slice user-500.slice. May 17 00:39:07.105994 systemd[1]: Starting user-runtime-dir@500.service... May 17 00:39:07.110360 systemd-logind[1398]: New session 1 of user core. May 17 00:39:07.117152 systemd[1]: Finished user-runtime-dir@500.service. May 17 00:39:07.119509 systemd[1]: Starting user@500.service... May 17 00:39:07.140165 (systemd)[1521]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 17 00:39:07.328105 systemd[1521]: Queued start job for default target default.target. May 17 00:39:07.328767 systemd[1521]: Reached target paths.target. May 17 00:39:07.328797 systemd[1521]: Reached target sockets.target. May 17 00:39:07.328814 systemd[1521]: Reached target timers.target. May 17 00:39:07.328829 systemd[1521]: Reached target basic.target. May 17 00:39:07.328962 systemd[1]: Started user@500.service. May 17 00:39:07.330213 systemd[1]: Started session-1.scope. May 17 00:39:07.330830 systemd[1521]: Reached target default.target. May 17 00:39:07.331026 systemd[1521]: Startup finished in 183ms. May 17 00:39:07.737974 locksmithd[1500]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 17 00:39:07.862558 login[1515]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) May 17 00:39:07.868320 systemd-logind[1398]: New session 2 of user core. May 17 00:39:07.869113 systemd[1]: Started session-2.scope. May 17 00:39:13.554690 waagent[1509]: 2025-05-17T00:39:13.554520Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 May 17 00:39:13.567631 waagent[1509]: 2025-05-17T00:39:13.556376Z INFO Daemon Daemon OS: flatcar 3510.3.7 May 17 00:39:13.567631 waagent[1509]: 2025-05-17T00:39:13.557412Z INFO Daemon Daemon Python: 3.9.16 May 17 00:39:13.567631 waagent[1509]: 2025-05-17T00:39:13.558643Z INFO Daemon Daemon Run daemon May 17 00:39:13.567631 waagent[1509]: 2025-05-17T00:39:13.560021Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.7' May 17 00:39:13.573428 waagent[1509]: 2025-05-17T00:39:13.573296Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. May 17 00:39:13.580068 waagent[1509]: 2025-05-17T00:39:13.579942Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' May 17 00:39:13.618061 waagent[1509]: 2025-05-17T00:39:13.580419Z INFO Daemon Daemon cloud-init is enabled: False May 17 00:39:13.618061 waagent[1509]: 2025-05-17T00:39:13.581207Z INFO Daemon Daemon Using waagent for provisioning May 17 00:39:13.618061 waagent[1509]: 2025-05-17T00:39:13.582501Z INFO Daemon Daemon Activate resource disk May 17 00:39:13.618061 waagent[1509]: 2025-05-17T00:39:13.583174Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb May 17 00:39:13.618061 waagent[1509]: 2025-05-17T00:39:13.590954Z INFO Daemon Daemon Found device: None May 17 00:39:13.618061 waagent[1509]: 2025-05-17T00:39:13.591630Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology May 17 00:39:13.618061 waagent[1509]: 2025-05-17T00:39:13.592513Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 May 17 00:39:13.618061 waagent[1509]: 2025-05-17T00:39:13.594138Z INFO Daemon Daemon Clean protocol and wireserver endpoint May 17 00:39:13.618061 waagent[1509]: 2025-05-17T00:39:13.594813Z INFO Daemon Daemon Running default provisioning handler May 17 00:39:13.618061 waagent[1509]: 2025-05-17T00:39:13.605095Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. May 17 00:39:13.618061 waagent[1509]: 2025-05-17T00:39:13.607887Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' May 17 00:39:13.618061 waagent[1509]: 2025-05-17T00:39:13.609120Z INFO Daemon Daemon cloud-init is enabled: False May 17 00:39:13.618061 waagent[1509]: 2025-05-17T00:39:13.609842Z INFO Daemon Daemon Copying ovf-env.xml May 17 00:39:13.696292 waagent[1509]: 2025-05-17T00:39:13.696107Z INFO Daemon Daemon Successfully mounted dvd May 17 00:39:13.799844 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. May 17 00:39:13.823367 waagent[1509]: 2025-05-17T00:39:13.823150Z INFO Daemon Daemon Detect protocol endpoint May 17 00:39:13.825998 waagent[1509]: 2025-05-17T00:39:13.825912Z INFO Daemon Daemon Clean protocol and wireserver endpoint May 17 00:39:13.828940 waagent[1509]: 2025-05-17T00:39:13.828865Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler May 17 00:39:13.831965 waagent[1509]: 2025-05-17T00:39:13.831897Z INFO Daemon Daemon Test for route to 168.63.129.16 May 17 00:39:13.834706 waagent[1509]: 2025-05-17T00:39:13.834643Z INFO Daemon Daemon Route to 168.63.129.16 exists May 17 00:39:13.837102 waagent[1509]: 2025-05-17T00:39:13.837038Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 May 17 00:39:13.983392 waagent[1509]: 2025-05-17T00:39:13.983304Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 May 17 00:39:13.990753 waagent[1509]: 2025-05-17T00:39:13.984272Z INFO Daemon Daemon Wire protocol version:2012-11-30 May 17 00:39:13.990753 waagent[1509]: 2025-05-17T00:39:13.984965Z INFO Daemon Daemon Server preferred version:2015-04-05 May 17 00:39:14.374110 waagent[1509]: 2025-05-17T00:39:14.373955Z INFO Daemon Daemon Initializing goal state during protocol detection May 17 00:39:14.386440 waagent[1509]: 2025-05-17T00:39:14.386347Z INFO Daemon Daemon Forcing an update of the goal state.. May 17 00:39:14.389373 waagent[1509]: 2025-05-17T00:39:14.389298Z INFO Daemon Daemon Fetching goal state [incarnation 1] May 17 00:39:14.462770 waagent[1509]: 2025-05-17T00:39:14.462620Z INFO Daemon Daemon Found private key matching thumbprint 505289FED7B5FF9920433D8E2EC75E774C2E0B3E May 17 00:39:14.469004 waagent[1509]: 2025-05-17T00:39:14.463328Z INFO Daemon Daemon Fetch goal state completed May 17 00:39:14.508611 waagent[1509]: 2025-05-17T00:39:14.508496Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 63b4ddc1-2599-46d8-9f22-4df72387aba7 New eTag: 15095011031362662958] May 17 00:39:14.515814 waagent[1509]: 2025-05-17T00:39:14.509598Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob May 17 00:39:14.519558 waagent[1509]: 2025-05-17T00:39:14.519489Z INFO Daemon Daemon Starting provisioning May 17 00:39:14.525989 waagent[1509]: 2025-05-17T00:39:14.519900Z INFO Daemon Daemon Handle ovf-env.xml. May 17 00:39:14.525989 waagent[1509]: 2025-05-17T00:39:14.520915Z INFO Daemon Daemon Set hostname [ci-3510.3.7-n-332dbccb2e] May 17 00:39:14.541196 waagent[1509]: 2025-05-17T00:39:14.541041Z INFO Daemon Daemon Publish hostname [ci-3510.3.7-n-332dbccb2e] May 17 00:39:14.542039 waagent[1509]: 2025-05-17T00:39:14.541952Z INFO Daemon Daemon Examine /proc/net/route for primary interface May 17 00:39:14.548500 waagent[1509]: 2025-05-17T00:39:14.542512Z INFO Daemon Daemon Primary interface is [eth0] May 17 00:39:14.556862 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. May 17 00:39:14.557121 systemd[1]: Stopped systemd-networkd-wait-online.service. May 17 00:39:14.557195 systemd[1]: Stopping systemd-networkd-wait-online.service... May 17 00:39:14.557545 systemd[1]: Stopping systemd-networkd.service... May 17 00:39:14.563623 systemd-networkd[1173]: eth0: DHCPv6 lease lost May 17 00:39:14.565029 systemd[1]: systemd-networkd.service: Deactivated successfully. May 17 00:39:14.565194 systemd[1]: Stopped systemd-networkd.service. May 17 00:39:14.567544 systemd[1]: Starting systemd-networkd.service... May 17 00:39:14.600449 systemd-networkd[1562]: enP6049s1: Link UP May 17 00:39:14.600461 systemd-networkd[1562]: enP6049s1: Gained carrier May 17 00:39:14.602169 systemd-networkd[1562]: eth0: Link UP May 17 00:39:14.602179 systemd-networkd[1562]: eth0: Gained carrier May 17 00:39:14.602674 systemd-networkd[1562]: lo: Link UP May 17 00:39:14.602683 systemd-networkd[1562]: lo: Gained carrier May 17 00:39:14.603004 systemd-networkd[1562]: eth0: Gained IPv6LL May 17 00:39:14.603295 systemd-networkd[1562]: Enumeration completed May 17 00:39:14.607658 waagent[1509]: 2025-05-17T00:39:14.604717Z INFO Daemon Daemon Create user account if not exists May 17 00:39:14.607658 waagent[1509]: 2025-05-17T00:39:14.605415Z INFO Daemon Daemon User core already exists, skip useradd May 17 00:39:14.607658 waagent[1509]: 2025-05-17T00:39:14.606333Z INFO Daemon Daemon Configure sudoer May 17 00:39:14.603432 systemd[1]: Started systemd-networkd.service. May 17 00:39:14.614882 waagent[1509]: 2025-05-17T00:39:14.611514Z INFO Daemon Daemon Configure sshd May 17 00:39:14.614882 waagent[1509]: 2025-05-17T00:39:14.612509Z INFO Daemon Daemon Deploy ssh public key. May 17 00:39:14.617715 systemd[1]: Starting systemd-networkd-wait-online.service... May 17 00:39:14.624538 systemd-networkd[1562]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 00:39:14.661668 systemd-networkd[1562]: eth0: DHCPv4 address 10.200.4.18/24, gateway 10.200.4.1 acquired from 168.63.129.16 May 17 00:39:14.665303 systemd[1]: Finished systemd-networkd-wait-online.service. May 17 00:39:15.727821 waagent[1509]: 2025-05-17T00:39:15.727720Z INFO Daemon Daemon Provisioning complete May 17 00:39:15.739348 waagent[1509]: 2025-05-17T00:39:15.739261Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping May 17 00:39:15.746082 waagent[1509]: 2025-05-17T00:39:15.739795Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. May 17 00:39:15.746082 waagent[1509]: 2025-05-17T00:39:15.741179Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent May 17 00:39:16.017741 waagent[1568]: 2025-05-17T00:39:16.017632Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent May 17 00:39:16.018541 waagent[1568]: 2025-05-17T00:39:16.018469Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 00:39:16.018715 waagent[1568]: 2025-05-17T00:39:16.018656Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 00:39:16.030382 waagent[1568]: 2025-05-17T00:39:16.030285Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. May 17 00:39:16.030611 waagent[1568]: 2025-05-17T00:39:16.030535Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] May 17 00:39:16.085061 waagent[1568]: 2025-05-17T00:39:16.084920Z INFO ExtHandler ExtHandler Found private key matching thumbprint 505289FED7B5FF9920433D8E2EC75E774C2E0B3E May 17 00:39:16.085400 waagent[1568]: 2025-05-17T00:39:16.085335Z INFO ExtHandler ExtHandler Fetch goal state completed May 17 00:39:16.098370 waagent[1568]: 2025-05-17T00:39:16.098301Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: 0b3e30da-74a5-4838-8c52-858ba09ccc70 New eTag: 15095011031362662958] May 17 00:39:16.098931 waagent[1568]: 2025-05-17T00:39:16.098870Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob May 17 00:39:16.189854 waagent[1568]: 2025-05-17T00:39:16.189711Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.7; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; May 17 00:39:16.214391 waagent[1568]: 2025-05-17T00:39:16.214287Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1568 May 17 00:39:16.217886 waagent[1568]: 2025-05-17T00:39:16.217808Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.7', '', 'Flatcar Container Linux by Kinvolk'] May 17 00:39:16.219080 waagent[1568]: 2025-05-17T00:39:16.219013Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules May 17 00:39:16.339645 waagent[1568]: 2025-05-17T00:39:16.339501Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service May 17 00:39:16.340022 waagent[1568]: 2025-05-17T00:39:16.339954Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup May 17 00:39:16.348552 waagent[1568]: 2025-05-17T00:39:16.348489Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now May 17 00:39:16.349105 waagent[1568]: 2025-05-17T00:39:16.349039Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' May 17 00:39:16.350275 waagent[1568]: 2025-05-17T00:39:16.350204Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] May 17 00:39:16.351629 waagent[1568]: 2025-05-17T00:39:16.351549Z INFO ExtHandler ExtHandler Starting env monitor service. May 17 00:39:16.352239 waagent[1568]: 2025-05-17T00:39:16.352181Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. May 17 00:39:16.352741 waagent[1568]: 2025-05-17T00:39:16.352682Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 00:39:16.353104 waagent[1568]: 2025-05-17T00:39:16.353027Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 00:39:16.353423 waagent[1568]: 2025-05-17T00:39:16.353363Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread May 17 00:39:16.353865 waagent[1568]: 2025-05-17T00:39:16.353812Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 00:39:16.353951 waagent[1568]: 2025-05-17T00:39:16.353899Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 00:39:16.354237 waagent[1568]: 2025-05-17T00:39:16.354184Z INFO ExtHandler ExtHandler Start Extension Telemetry service. May 17 00:39:16.354849 waagent[1568]: 2025-05-17T00:39:16.354794Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. May 17 00:39:16.355785 waagent[1568]: 2025-05-17T00:39:16.355728Z INFO EnvHandler ExtHandler Configure routes May 17 00:39:16.355931 waagent[1568]: 2025-05-17T00:39:16.355874Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: May 17 00:39:16.355931 waagent[1568]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT May 17 00:39:16.355931 waagent[1568]: eth0 00000000 0104C80A 0003 0 0 1024 00000000 0 0 0 May 17 00:39:16.355931 waagent[1568]: eth0 0004C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 May 17 00:39:16.355931 waagent[1568]: eth0 0104C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 May 17 00:39:16.355931 waagent[1568]: eth0 10813FA8 0104C80A 0007 0 0 1024 FFFFFFFF 0 0 0 May 17 00:39:16.355931 waagent[1568]: eth0 FEA9FEA9 0104C80A 0007 0 0 1024 FFFFFFFF 0 0 0 May 17 00:39:16.359790 waagent[1568]: 2025-05-17T00:39:16.359624Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True May 17 00:39:16.360063 waagent[1568]: 2025-05-17T00:39:16.360006Z INFO EnvHandler ExtHandler Gateway:None May 17 00:39:16.360366 waagent[1568]: 2025-05-17T00:39:16.360279Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. May 17 00:39:16.360442 waagent[1568]: 2025-05-17T00:39:16.360396Z INFO EnvHandler ExtHandler Routes:None May 17 00:39:16.364029 waagent[1568]: 2025-05-17T00:39:16.363973Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread May 17 00:39:16.373746 waagent[1568]: 2025-05-17T00:39:16.373681Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) May 17 00:39:16.375450 waagent[1568]: 2025-05-17T00:39:16.375398Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required May 17 00:39:16.376596 waagent[1568]: 2025-05-17T00:39:16.376528Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' May 17 00:39:16.411676 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 17 00:39:16.411977 systemd[1]: Stopped kubelet.service. May 17 00:39:16.412028 systemd[1]: kubelet.service: Consumed 1.179s CPU time. May 17 00:39:16.413852 systemd[1]: Starting kubelet.service... May 17 00:39:16.421480 waagent[1568]: 2025-05-17T00:39:16.421370Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1562' May 17 00:39:16.435268 waagent[1568]: 2025-05-17T00:39:16.435163Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. May 17 00:39:17.185502 systemd[1]: Started kubelet.service. May 17 00:39:17.212741 waagent[1568]: 2025-05-17T00:39:17.212560Z INFO MonitorHandler ExtHandler Network interfaces: May 17 00:39:17.212741 waagent[1568]: Executing ['ip', '-a', '-o', 'link']: May 17 00:39:17.212741 waagent[1568]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 May 17 00:39:17.212741 waagent[1568]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 60:45:bd:fb:f3:0f brd ff:ff:ff:ff:ff:ff May 17 00:39:17.212741 waagent[1568]: 3: enP6049s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 60:45:bd:fb:f3:0f brd ff:ff:ff:ff:ff:ff\ altname enP6049p0s2 May 17 00:39:17.212741 waagent[1568]: Executing ['ip', '-4', '-a', '-o', 'address']: May 17 00:39:17.212741 waagent[1568]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever May 17 00:39:17.212741 waagent[1568]: 2: eth0 inet 10.200.4.18/24 metric 1024 brd 10.200.4.255 scope global eth0\ valid_lft forever preferred_lft forever May 17 00:39:17.212741 waagent[1568]: Executing ['ip', '-6', '-a', '-o', 'address']: May 17 00:39:17.212741 waagent[1568]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever May 17 00:39:17.212741 waagent[1568]: 2: eth0 inet6 fe80::6245:bdff:fefb:f30f/64 scope link \ valid_lft forever preferred_lft forever May 17 00:39:17.276535 kubelet[1597]: E0517 00:39:17.276485 1597 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:39:17.279506 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:39:17.279694 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:39:17.416942 waagent[1568]: 2025-05-17T00:39:17.416873Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.13.1.1 -- exiting May 17 00:39:17.746429 waagent[1509]: 2025-05-17T00:39:17.746234Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running May 17 00:39:17.751903 waagent[1509]: 2025-05-17T00:39:17.751820Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.13.1.1 to be the latest agent May 17 00:39:18.861181 waagent[1605]: 2025-05-17T00:39:18.861061Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.13.1.1) May 17 00:39:18.862586 waagent[1605]: 2025-05-17T00:39:18.862501Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.7 May 17 00:39:18.862747 waagent[1605]: 2025-05-17T00:39:18.862689Z INFO ExtHandler ExtHandler Python: 3.9.16 May 17 00:39:18.862892 waagent[1605]: 2025-05-17T00:39:18.862846Z INFO ExtHandler ExtHandler CPU Arch: x86_64 May 17 00:39:18.879434 waagent[1605]: 2025-05-17T00:39:18.879304Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.7; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; Arch: x86_64; systemd: True; systemd_version: systemd 252 (252); LISDrivers: Absent; logrotate: logrotate 3.20.1; May 17 00:39:18.879906 waagent[1605]: 2025-05-17T00:39:18.879841Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 00:39:18.880085 waagent[1605]: 2025-05-17T00:39:18.880036Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 00:39:18.880320 waagent[1605]: 2025-05-17T00:39:18.880269Z INFO ExtHandler ExtHandler Initializing the goal state... May 17 00:39:18.892976 waagent[1605]: 2025-05-17T00:39:18.892886Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] May 17 00:39:18.901302 waagent[1605]: 2025-05-17T00:39:18.901226Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.166 May 17 00:39:18.902330 waagent[1605]: 2025-05-17T00:39:18.902262Z INFO ExtHandler May 17 00:39:18.902488 waagent[1605]: 2025-05-17T00:39:18.902433Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 5b95265d-fc9c-46b5-b0ab-11e7d455c710 eTag: 15095011031362662958 source: Fabric] May 17 00:39:18.903217 waagent[1605]: 2025-05-17T00:39:18.903156Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. May 17 00:39:18.904336 waagent[1605]: 2025-05-17T00:39:18.904274Z INFO ExtHandler May 17 00:39:18.904472 waagent[1605]: 2025-05-17T00:39:18.904419Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] May 17 00:39:18.911392 waagent[1605]: 2025-05-17T00:39:18.911332Z INFO ExtHandler ExtHandler Downloading artifacts profile blob May 17 00:39:18.911912 waagent[1605]: 2025-05-17T00:39:18.911861Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required May 17 00:39:18.933056 waagent[1605]: 2025-05-17T00:39:18.932977Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. May 17 00:39:18.991438 waagent[1605]: 2025-05-17T00:39:18.991299Z INFO ExtHandler Downloaded certificate {'thumbprint': '505289FED7B5FF9920433D8E2EC75E774C2E0B3E', 'hasPrivateKey': True} May 17 00:39:18.992732 waagent[1605]: 2025-05-17T00:39:18.992661Z INFO ExtHandler Fetch goal state from WireServer completed May 17 00:39:18.993545 waagent[1605]: 2025-05-17T00:39:18.993483Z INFO ExtHandler ExtHandler Goal state initialization completed. May 17 00:39:19.010560 waagent[1605]: 2025-05-17T00:39:19.010459Z INFO ExtHandler ExtHandler OpenSSL version: OpenSSL 3.0.15 3 Sep 2024 (Library: OpenSSL 3.0.15 3 Sep 2024) May 17 00:39:19.018730 waagent[1605]: 2025-05-17T00:39:19.018628Z INFO ExtHandler ExtHandler Using iptables [version 1.8.8] to manage firewall rules May 17 00:39:19.022382 waagent[1605]: 2025-05-17T00:39:19.022279Z INFO ExtHandler ExtHandler Did not find a legacy firewall rule: ['iptables', '-w', '-t', 'security', '-C', 'OUTPUT', '-d', '168.63.129.16', '-p', 'tcp', '-m', 'conntrack', '--ctstate', 'INVALID,NEW', '-j', 'ACCEPT'] May 17 00:39:19.022609 waagent[1605]: 2025-05-17T00:39:19.022541Z INFO ExtHandler ExtHandler Checking state of the firewall May 17 00:39:19.248420 waagent[1605]: 2025-05-17T00:39:19.248219Z INFO ExtHandler ExtHandler Created firewall rules for Azure Fabric: May 17 00:39:19.248420 waagent[1605]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) May 17 00:39:19.248420 waagent[1605]: pkts bytes target prot opt in out source destination May 17 00:39:19.248420 waagent[1605]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) May 17 00:39:19.248420 waagent[1605]: pkts bytes target prot opt in out source destination May 17 00:39:19.248420 waagent[1605]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) May 17 00:39:19.248420 waagent[1605]: pkts bytes target prot opt in out source destination May 17 00:39:19.248420 waagent[1605]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 May 17 00:39:19.248420 waagent[1605]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 May 17 00:39:19.248420 waagent[1605]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW May 17 00:39:19.249495 waagent[1605]: 2025-05-17T00:39:19.249425Z INFO ExtHandler ExtHandler Setting up persistent firewall rules May 17 00:39:19.252315 waagent[1605]: 2025-05-17T00:39:19.252208Z INFO ExtHandler ExtHandler The firewalld service is not present on the system May 17 00:39:19.252576 waagent[1605]: 2025-05-17T00:39:19.252513Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service May 17 00:39:19.252981 waagent[1605]: 2025-05-17T00:39:19.252919Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup May 17 00:39:19.261554 waagent[1605]: 2025-05-17T00:39:19.261492Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now May 17 00:39:19.262105 waagent[1605]: 2025-05-17T00:39:19.262038Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' May 17 00:39:19.269587 waagent[1605]: 2025-05-17T00:39:19.269483Z INFO ExtHandler ExtHandler WALinuxAgent-2.13.1.1 running as process 1605 May 17 00:39:19.272550 waagent[1605]: 2025-05-17T00:39:19.272472Z INFO ExtHandler ExtHandler [CGI] Cgroups is not currently supported on ['flatcar', '3510.3.7', '', 'Flatcar Container Linux by Kinvolk'] May 17 00:39:19.273369 waagent[1605]: 2025-05-17T00:39:19.273303Z INFO ExtHandler ExtHandler [CGI] Agent will reset the quotas in case cgroup usage went from enabled to disabled May 17 00:39:19.274239 waagent[1605]: 2025-05-17T00:39:19.274177Z INFO ExtHandler ExtHandler [CGI] Agent cgroups enabled: False May 17 00:39:19.276761 waagent[1605]: 2025-05-17T00:39:19.276693Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: 1. configuration enabled [True], 2. cgroups v1 enabled [False] OR cgroups v2 is in use and v2 resource limiting configuration enabled [False], 3. python supported: [True] May 17 00:39:19.278090 waagent[1605]: 2025-05-17T00:39:19.278023Z INFO ExtHandler ExtHandler Starting env monitor service. May 17 00:39:19.278514 waagent[1605]: 2025-05-17T00:39:19.278456Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 00:39:19.278693 waagent[1605]: 2025-05-17T00:39:19.278643Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 00:39:19.279227 waagent[1605]: 2025-05-17T00:39:19.279165Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. May 17 00:39:19.279521 waagent[1605]: 2025-05-17T00:39:19.279465Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: May 17 00:39:19.279521 waagent[1605]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT May 17 00:39:19.279521 waagent[1605]: eth0 00000000 0104C80A 0003 0 0 1024 00000000 0 0 0 May 17 00:39:19.279521 waagent[1605]: eth0 0004C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 May 17 00:39:19.279521 waagent[1605]: eth0 0104C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 May 17 00:39:19.279521 waagent[1605]: eth0 10813FA8 0104C80A 0007 0 0 1024 FFFFFFFF 0 0 0 May 17 00:39:19.279521 waagent[1605]: eth0 FEA9FEA9 0104C80A 0007 0 0 1024 FFFFFFFF 0 0 0 May 17 00:39:19.283171 waagent[1605]: 2025-05-17T00:39:19.283009Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 00:39:19.283441 waagent[1605]: 2025-05-17T00:39:19.283359Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 00:39:19.283949 waagent[1605]: 2025-05-17T00:39:19.283646Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. May 17 00:39:19.284405 waagent[1605]: 2025-05-17T00:39:19.284338Z INFO EnvHandler ExtHandler Configure routes May 17 00:39:19.284894 waagent[1605]: 2025-05-17T00:39:19.284831Z INFO EnvHandler ExtHandler Gateway:None May 17 00:39:19.285411 waagent[1605]: 2025-05-17T00:39:19.285354Z INFO EnvHandler ExtHandler Routes:None May 17 00:39:19.286236 waagent[1605]: 2025-05-17T00:39:19.286177Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread May 17 00:39:19.289583 waagent[1605]: 2025-05-17T00:39:19.288630Z INFO ExtHandler ExtHandler Start Extension Telemetry service. May 17 00:39:19.303267 waagent[1605]: 2025-05-17T00:39:19.303186Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True May 17 00:39:19.305272 waagent[1605]: 2025-05-17T00:39:19.305109Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. May 17 00:39:19.305840 waagent[1605]: 2025-05-17T00:39:19.305778Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread May 17 00:39:19.307929 waagent[1605]: 2025-05-17T00:39:19.307861Z INFO MonitorHandler ExtHandler Network interfaces: May 17 00:39:19.307929 waagent[1605]: Executing ['ip', '-a', '-o', 'link']: May 17 00:39:19.307929 waagent[1605]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 May 17 00:39:19.307929 waagent[1605]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 60:45:bd:fb:f3:0f brd ff:ff:ff:ff:ff:ff May 17 00:39:19.307929 waagent[1605]: 3: enP6049s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 60:45:bd:fb:f3:0f brd ff:ff:ff:ff:ff:ff\ altname enP6049p0s2 May 17 00:39:19.307929 waagent[1605]: Executing ['ip', '-4', '-a', '-o', 'address']: May 17 00:39:19.307929 waagent[1605]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever May 17 00:39:19.307929 waagent[1605]: 2: eth0 inet 10.200.4.18/24 metric 1024 brd 10.200.4.255 scope global eth0\ valid_lft forever preferred_lft forever May 17 00:39:19.307929 waagent[1605]: Executing ['ip', '-6', '-a', '-o', 'address']: May 17 00:39:19.307929 waagent[1605]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever May 17 00:39:19.307929 waagent[1605]: 2: eth0 inet6 fe80::6245:bdff:fefb:f30f/64 scope link \ valid_lft forever preferred_lft forever May 17 00:39:19.327213 waagent[1605]: 2025-05-17T00:39:19.327116Z INFO ExtHandler ExtHandler Downloading agent manifest May 17 00:39:19.343404 waagent[1605]: 2025-05-17T00:39:19.343337Z INFO ExtHandler ExtHandler May 17 00:39:19.343747 waagent[1605]: 2025-05-17T00:39:19.343700Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: e06eb490-f26e-4fc7-93a0-2c617ea614cd correlation 1bf8f1a1-82de-4cb4-a813-9010fbab8fe1 created: 2025-05-17T00:37:41.572403Z] May 17 00:39:19.344654 waagent[1605]: 2025-05-17T00:39:19.344601Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. May 17 00:39:19.346339 waagent[1605]: 2025-05-17T00:39:19.346289Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 2 ms] May 17 00:39:19.366375 waagent[1605]: 2025-05-17T00:39:19.366292Z INFO ExtHandler ExtHandler Looking for existing remote access users. May 17 00:39:19.369120 waagent[1605]: 2025-05-17T00:39:19.369047Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.13.1.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: D5C8AE66-20B0-4F30-9499-8E4C3613ECB3;UpdateGSErrors: 0;AutoUpdate: 1;UpdateMode: SelfUpdate;] May 17 00:39:19.396786 waagent[1605]: 2025-05-17T00:39:19.396661Z INFO EnvHandler ExtHandler Using iptables [version 1.8.8] to manage firewall rules May 17 00:39:19.416965 waagent[1605]: 2025-05-17T00:39:19.416891Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 May 17 00:39:27.500129 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 17 00:39:27.500464 systemd[1]: Stopped kubelet.service. May 17 00:39:27.502499 systemd[1]: Starting kubelet.service... May 17 00:39:27.598107 systemd[1]: Started kubelet.service. May 17 00:39:27.636888 kubelet[1650]: E0517 00:39:27.636845 1650 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:39:27.638634 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:39:27.638795 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:39:29.037083 systemd[1]: Created slice system-sshd.slice. May 17 00:39:29.039005 systemd[1]: Started sshd@0-10.200.4.18:22-10.200.16.10:52394.service. May 17 00:39:29.880194 sshd[1658]: Accepted publickey for core from 10.200.16.10 port 52394 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:39:29.881992 sshd[1658]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:39:29.886631 systemd-logind[1398]: New session 3 of user core. May 17 00:39:29.888037 systemd[1]: Started session-3.scope. May 17 00:39:30.396374 systemd[1]: Started sshd@1-10.200.4.18:22-10.200.16.10:52408.service. May 17 00:39:30.998224 sshd[1663]: Accepted publickey for core from 10.200.16.10 port 52408 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:39:31.000006 sshd[1663]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:39:31.005691 systemd-logind[1398]: New session 4 of user core. May 17 00:39:31.005705 systemd[1]: Started session-4.scope. May 17 00:39:31.431385 sshd[1663]: pam_unix(sshd:session): session closed for user core May 17 00:39:31.434539 systemd[1]: sshd@1-10.200.4.18:22-10.200.16.10:52408.service: Deactivated successfully. May 17 00:39:31.435423 systemd[1]: session-4.scope: Deactivated successfully. May 17 00:39:31.436040 systemd-logind[1398]: Session 4 logged out. Waiting for processes to exit. May 17 00:39:31.436882 systemd-logind[1398]: Removed session 4. May 17 00:39:31.530193 systemd[1]: Started sshd@2-10.200.4.18:22-10.200.16.10:52420.service. May 17 00:39:32.119265 sshd[1669]: Accepted publickey for core from 10.200.16.10 port 52420 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:39:32.120814 sshd[1669]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:39:32.125614 systemd[1]: Started session-5.scope. May 17 00:39:32.126078 systemd-logind[1398]: New session 5 of user core. May 17 00:39:32.549849 sshd[1669]: pam_unix(sshd:session): session closed for user core May 17 00:39:32.553211 systemd[1]: sshd@2-10.200.4.18:22-10.200.16.10:52420.service: Deactivated successfully. May 17 00:39:32.554229 systemd[1]: session-5.scope: Deactivated successfully. May 17 00:39:32.555029 systemd-logind[1398]: Session 5 logged out. Waiting for processes to exit. May 17 00:39:32.555955 systemd-logind[1398]: Removed session 5. May 17 00:39:32.649480 systemd[1]: Started sshd@3-10.200.4.18:22-10.200.16.10:52432.service. May 17 00:39:33.236876 sshd[1675]: Accepted publickey for core from 10.200.16.10 port 52432 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:39:33.238628 sshd[1675]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:39:33.244353 systemd[1]: Started session-6.scope. May 17 00:39:33.245001 systemd-logind[1398]: New session 6 of user core. May 17 00:39:33.667995 sshd[1675]: pam_unix(sshd:session): session closed for user core May 17 00:39:33.671179 systemd[1]: sshd@3-10.200.4.18:22-10.200.16.10:52432.service: Deactivated successfully. May 17 00:39:33.672185 systemd[1]: session-6.scope: Deactivated successfully. May 17 00:39:33.672974 systemd-logind[1398]: Session 6 logged out. Waiting for processes to exit. May 17 00:39:33.673768 systemd-logind[1398]: Removed session 6. May 17 00:39:33.766795 systemd[1]: Started sshd@4-10.200.4.18:22-10.200.16.10:52444.service. May 17 00:39:34.358724 sshd[1681]: Accepted publickey for core from 10.200.16.10 port 52444 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:39:34.360394 sshd[1681]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:39:34.366201 systemd[1]: Started session-7.scope. May 17 00:39:34.366975 systemd-logind[1398]: New session 7 of user core. May 17 00:39:35.000604 sudo[1684]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 17 00:39:35.000919 sudo[1684]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:39:35.028815 dbus-daemon[1388]: \xd0MD\xc5/V: received setenforce notice (enforcing=401025504) May 17 00:39:35.031096 sudo[1684]: pam_unix(sudo:session): session closed for user root May 17 00:39:35.157654 sshd[1681]: pam_unix(sshd:session): session closed for user core May 17 00:39:35.161506 systemd[1]: sshd@4-10.200.4.18:22-10.200.16.10:52444.service: Deactivated successfully. May 17 00:39:35.162646 systemd[1]: session-7.scope: Deactivated successfully. May 17 00:39:35.163469 systemd-logind[1398]: Session 7 logged out. Waiting for processes to exit. May 17 00:39:35.164467 systemd-logind[1398]: Removed session 7. May 17 00:39:35.257686 systemd[1]: Started sshd@5-10.200.4.18:22-10.200.16.10:52452.service. May 17 00:39:35.853323 sshd[1688]: Accepted publickey for core from 10.200.16.10 port 52452 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:39:35.855086 sshd[1688]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:39:35.860793 systemd[1]: Started session-8.scope. May 17 00:39:35.861388 systemd-logind[1398]: New session 8 of user core. May 17 00:39:36.182898 sudo[1692]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 17 00:39:36.183198 sudo[1692]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:39:36.186184 sudo[1692]: pam_unix(sudo:session): session closed for user root May 17 00:39:36.190885 sudo[1691]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 17 00:39:36.191178 sudo[1691]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:39:36.200412 systemd[1]: Stopping audit-rules.service... May 17 00:39:36.200000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 17 00:39:36.205127 kernel: kauditd_printk_skb: 2 callbacks suppressed May 17 00:39:36.205193 kernel: audit: type=1305 audit(1747442376.200:214): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 17 00:39:36.209775 auditctl[1695]: No rules May 17 00:39:36.224666 kernel: audit: type=1300 audit(1747442376.200:214): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc36b87670 a2=420 a3=0 items=0 ppid=1 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:36.200000 audit[1695]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc36b87670 a2=420 a3=0 items=0 ppid=1 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:36.200000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 17 00:39:36.210299 systemd[1]: audit-rules.service: Deactivated successfully. May 17 00:39:36.210479 systemd[1]: Stopped audit-rules.service. May 17 00:39:36.225846 systemd[1]: Starting audit-rules.service... May 17 00:39:36.208000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.239079 kernel: audit: type=1327 audit(1747442376.200:214): proctitle=2F7362696E2F617564697463746C002D44 May 17 00:39:36.239222 kernel: audit: type=1131 audit(1747442376.208:215): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.248530 augenrules[1712]: No rules May 17 00:39:36.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.250359 sudo[1691]: pam_unix(sudo:session): session closed for user root May 17 00:39:36.249179 systemd[1]: Finished audit-rules.service. May 17 00:39:36.259594 kernel: audit: type=1130 audit(1747442376.247:216): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.259697 kernel: audit: type=1106 audit(1747442376.248:217): pid=1691 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:39:36.248000 audit[1691]: USER_END pid=1691 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:39:36.248000 audit[1691]: CRED_DISP pid=1691 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:39:36.270587 kernel: audit: type=1104 audit(1747442376.248:218): pid=1691 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:39:36.349383 sshd[1688]: pam_unix(sshd:session): session closed for user core May 17 00:39:36.349000 audit[1688]: USER_END pid=1688 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:36.353074 systemd-logind[1398]: Session 8 logged out. Waiting for processes to exit. May 17 00:39:36.353838 systemd[1]: sshd@5-10.200.4.18:22-10.200.16.10:52452.service: Deactivated successfully. May 17 00:39:36.354546 systemd[1]: session-8.scope: Deactivated successfully. May 17 00:39:36.355813 systemd-logind[1398]: Removed session 8. May 17 00:39:36.349000 audit[1688]: CRED_DISP pid=1688 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:36.375702 kernel: audit: type=1106 audit(1747442376.349:219): pid=1688 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:36.375790 kernel: audit: type=1104 audit(1747442376.349:220): pid=1688 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:36.375820 kernel: audit: type=1131 audit(1747442376.349:221): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.4.18:22-10.200.16.10:52452 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.349000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.4.18:22-10.200.16.10:52452 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:36.450914 systemd[1]: Started sshd@6-10.200.4.18:22-10.200.16.10:52468.service. May 17 00:39:36.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.4.18:22-10.200.16.10:52468 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:37.105000 audit[1718]: USER_ACCT pid=1718 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:37.107269 sshd[1718]: Accepted publickey for core from 10.200.16.10 port 52468 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:39:37.106000 audit[1718]: CRED_ACQ pid=1718 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:37.106000 audit[1718]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffeec765a0 a2=3 a3=0 items=0 ppid=1 pid=1718 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:37.106000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:39:37.108857 sshd[1718]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:39:37.113719 systemd[1]: Started session-9.scope. May 17 00:39:37.114179 systemd-logind[1398]: New session 9 of user core. May 17 00:39:37.117000 audit[1718]: USER_START pid=1718 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:37.118000 audit[1720]: CRED_ACQ pid=1720 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:37.445000 audit[1721]: USER_ACCT pid=1721 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:39:37.445000 audit[1721]: CRED_REFR pid=1721 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:39:37.447319 sudo[1721]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 17 00:39:37.447642 sudo[1721]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:39:37.448000 audit[1721]: USER_START pid=1721 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:39:37.477183 systemd[1]: Starting coreos-metadata.service... May 17 00:39:37.547882 coreos-metadata[1725]: May 17 00:39:37.547 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 May 17 00:39:37.550619 coreos-metadata[1725]: May 17 00:39:37.550 INFO Fetch successful May 17 00:39:37.550936 coreos-metadata[1725]: May 17 00:39:37.550 INFO Fetching http://168.63.129.16/machine/?comp=goalstate: Attempt #1 May 17 00:39:37.552506 coreos-metadata[1725]: May 17 00:39:37.552 INFO Fetch successful May 17 00:39:37.552953 coreos-metadata[1725]: May 17 00:39:37.552 INFO Fetching http://168.63.129.16/machine/07821cbe-0717-40dc-a23a-3df335237768/246aa98e%2D63a8%2D49b6%2Da0d6%2Dfc7ad9aa3dcd.%5Fci%2D3510.3.7%2Dn%2D332dbccb2e?comp=config&type=sharedConfig&incarnation=1: Attempt #1 May 17 00:39:37.554731 coreos-metadata[1725]: May 17 00:39:37.554 INFO Fetch successful May 17 00:39:37.587709 coreos-metadata[1725]: May 17 00:39:37.587 INFO Fetching http://169.254.169.254/metadata/instance/compute/vmSize?api-version=2017-08-01&format=text: Attempt #1 May 17 00:39:37.596556 coreos-metadata[1725]: May 17 00:39:37.596 INFO Fetch successful May 17 00:39:37.605714 systemd[1]: Finished coreos-metadata.service. May 17 00:39:37.604000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:37.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:37.748000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:37.750104 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. May 17 00:39:37.750349 systemd[1]: Stopped kubelet.service. May 17 00:39:37.752030 systemd[1]: Starting kubelet.service... May 17 00:39:38.638150 systemd[1]: Started kubelet.service. May 17 00:39:38.637000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:38.706347 kubelet[1745]: E0517 00:39:38.705988 1745 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:39:38.708493 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:39:38.708668 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:39:38.707000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:39:38.931013 systemd[1]: Stopped kubelet.service. May 17 00:39:38.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:38.929000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:38.933757 systemd[1]: Starting kubelet.service... May 17 00:39:38.968480 systemd[1]: Reloading. May 17 00:39:39.085165 /usr/lib/systemd/system-generators/torcx-generator[1789]: time="2025-05-17T00:39:39Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:39:39.094687 /usr/lib/systemd/system-generators/torcx-generator[1789]: time="2025-05-17T00:39:39Z" level=info msg="torcx already run" May 17 00:39:39.191119 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:39:39.191142 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:39:39.208043 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:39:39.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.278000 audit: BPF prog-id=47 op=LOAD May 17 00:39:39.278000 audit: BPF prog-id=40 op=UNLOAD May 17 00:39:39.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.280000 audit: BPF prog-id=48 op=LOAD May 17 00:39:39.280000 audit: BPF prog-id=44 op=UNLOAD May 17 00:39:39.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.282000 audit: BPF prog-id=49 op=LOAD May 17 00:39:39.282000 audit: BPF prog-id=39 op=UNLOAD May 17 00:39:39.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.282000 audit: BPF prog-id=50 op=LOAD May 17 00:39:39.282000 audit: BPF prog-id=30 op=UNLOAD May 17 00:39:39.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.283000 audit: BPF prog-id=51 op=LOAD May 17 00:39:39.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.283000 audit: BPF prog-id=52 op=LOAD May 17 00:39:39.283000 audit: BPF prog-id=31 op=UNLOAD May 17 00:39:39.283000 audit: BPF prog-id=32 op=UNLOAD May 17 00:39:39.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.285000 audit: BPF prog-id=53 op=LOAD May 17 00:39:39.285000 audit: BPF prog-id=41 op=UNLOAD May 17 00:39:39.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.285000 audit: BPF prog-id=54 op=LOAD May 17 00:39:39.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.285000 audit: BPF prog-id=55 op=LOAD May 17 00:39:39.285000 audit: BPF prog-id=42 op=UNLOAD May 17 00:39:39.285000 audit: BPF prog-id=43 op=UNLOAD May 17 00:39:39.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.286000 audit: BPF prog-id=56 op=LOAD May 17 00:39:39.286000 audit: BPF prog-id=33 op=UNLOAD May 17 00:39:39.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.286000 audit: BPF prog-id=57 op=LOAD May 17 00:39:39.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.286000 audit: BPF prog-id=58 op=LOAD May 17 00:39:39.286000 audit: BPF prog-id=34 op=UNLOAD May 17 00:39:39.286000 audit: BPF prog-id=35 op=UNLOAD May 17 00:39:39.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.288000 audit: BPF prog-id=59 op=LOAD May 17 00:39:39.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.288000 audit: BPF prog-id=60 op=LOAD May 17 00:39:39.288000 audit: BPF prog-id=36 op=UNLOAD May 17 00:39:39.288000 audit: BPF prog-id=37 op=UNLOAD May 17 00:39:39.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:39.290000 audit: BPF prog-id=61 op=LOAD May 17 00:39:39.290000 audit: BPF prog-id=46 op=UNLOAD May 17 00:39:39.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:39.315282 systemd[1]: Stopping kubelet.service... May 17 00:39:39.315691 systemd[1]: kubelet.service: Deactivated successfully. May 17 00:39:39.314000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:39.315903 systemd[1]: Stopped kubelet.service. May 17 00:39:39.317689 systemd[1]: Starting kubelet.service... May 17 00:39:39.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:39.778105 systemd[1]: Started kubelet.service. May 17 00:39:40.548765 kubelet[1859]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:39:40.548765 kubelet[1859]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 17 00:39:40.548765 kubelet[1859]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:39:40.549272 kubelet[1859]: I0517 00:39:40.548843 1859 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 17 00:39:40.864422 kubelet[1859]: I0517 00:39:40.864060 1859 server.go:520] "Kubelet version" kubeletVersion="v1.32.4" May 17 00:39:40.864422 kubelet[1859]: I0517 00:39:40.864096 1859 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 17 00:39:40.864703 kubelet[1859]: I0517 00:39:40.864673 1859 server.go:954] "Client rotation is on, will bootstrap in background" May 17 00:39:40.889189 kubelet[1859]: I0517 00:39:40.889151 1859 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 17 00:39:40.900583 kubelet[1859]: E0517 00:39:40.900545 1859 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 17 00:39:40.900583 kubelet[1859]: I0517 00:39:40.900583 1859 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 17 00:39:40.906298 kubelet[1859]: I0517 00:39:40.906261 1859 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 17 00:39:40.906579 kubelet[1859]: I0517 00:39:40.906521 1859 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 17 00:39:40.906774 kubelet[1859]: I0517 00:39:40.906560 1859 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.200.4.18","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 17 00:39:40.906957 kubelet[1859]: I0517 00:39:40.906790 1859 topology_manager.go:138] "Creating topology manager with none policy" May 17 00:39:40.906957 kubelet[1859]: I0517 00:39:40.906804 1859 container_manager_linux.go:304] "Creating device plugin manager" May 17 00:39:40.907053 kubelet[1859]: I0517 00:39:40.906986 1859 state_mem.go:36] "Initialized new in-memory state store" May 17 00:39:40.910458 kubelet[1859]: I0517 00:39:40.910427 1859 kubelet.go:446] "Attempting to sync node with API server" May 17 00:39:40.910857 kubelet[1859]: I0517 00:39:40.910829 1859 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 17 00:39:40.911283 kubelet[1859]: I0517 00:39:40.911262 1859 kubelet.go:352] "Adding apiserver pod source" May 17 00:39:40.911374 kubelet[1859]: E0517 00:39:40.911351 1859 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:40.911427 kubelet[1859]: E0517 00:39:40.911403 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:40.911476 kubelet[1859]: I0517 00:39:40.911431 1859 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 17 00:39:40.915087 kubelet[1859]: I0517 00:39:40.915068 1859 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 17 00:39:40.915770 kubelet[1859]: I0517 00:39:40.915753 1859 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 17 00:39:40.916780 kubelet[1859]: W0517 00:39:40.916760 1859 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 17 00:39:40.922142 kubelet[1859]: I0517 00:39:40.922118 1859 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 17 00:39:40.922239 kubelet[1859]: I0517 00:39:40.922162 1859 server.go:1287] "Started kubelet" May 17 00:39:40.921000 audit[1859]: AVC avc: denied { mac_admin } for pid=1859 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:40.921000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:39:40.921000 audit[1859]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008bfe90 a1=c0006f8660 a2=c0008bfe60 a3=25 items=0 ppid=1 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:40.921000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:39:40.922000 audit[1859]: AVC avc: denied { mac_admin } for pid=1859 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:40.922000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:39:40.922000 audit[1859]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00083a040 a1=c0006f8678 a2=c0008bff20 a3=25 items=0 ppid=1 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:40.922000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:39:40.924292 kubelet[1859]: I0517 00:39:40.923622 1859 kubelet.go:1507] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 17 00:39:40.924292 kubelet[1859]: I0517 00:39:40.923674 1859 kubelet.go:1511] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 17 00:39:40.924292 kubelet[1859]: I0517 00:39:40.923753 1859 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 17 00:39:40.926000 audit[1872]: NETFILTER_CFG table=mangle:5 family=2 entries=2 op=nft_register_chain pid=1872 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:39:40.926000 audit[1872]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffecff3c560 a2=0 a3=7ffecff3c54c items=0 ppid=1859 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:40.926000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 00:39:40.928000 audit[1873]: NETFILTER_CFG table=filter:6 family=2 entries=2 op=nft_register_chain pid=1873 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:39:40.928000 audit[1873]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7fffc30c8770 a2=0 a3=7fffc30c875c items=0 ppid=1859 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:40.928000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 00:39:40.930467 kubelet[1859]: I0517 00:39:40.930419 1859 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 17 00:39:40.931279 kubelet[1859]: I0517 00:39:40.931253 1859 volume_manager.go:297] "Starting Kubelet Volume Manager" May 17 00:39:40.931620 kubelet[1859]: E0517 00:39:40.931557 1859 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.4.18\" not found" May 17 00:39:40.932003 kubelet[1859]: I0517 00:39:40.931985 1859 server.go:479] "Adding debug handlers to kubelet server" May 17 00:39:40.931000 audit[1875]: NETFILTER_CFG table=filter:7 family=2 entries=2 op=nft_register_chain pid=1875 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:39:40.931000 audit[1875]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe153a9f90 a2=0 a3=7ffe153a9f7c items=0 ppid=1859 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:40.931000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:39:40.933694 kubelet[1859]: I0517 00:39:40.933638 1859 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 17 00:39:40.934016 kubelet[1859]: I0517 00:39:40.933990 1859 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 17 00:39:40.934338 kubelet[1859]: I0517 00:39:40.934306 1859 desired_state_of_world_populator.go:150] "Desired state populator starts to run" May 17 00:39:40.934419 kubelet[1859]: I0517 00:39:40.934361 1859 reconciler.go:26] "Reconciler: start to sync state" May 17 00:39:40.933000 audit[1877]: NETFILTER_CFG table=filter:8 family=2 entries=2 op=nft_register_chain pid=1877 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:39:40.933000 audit[1877]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffef1090c0 a2=0 a3=7fffef1090ac items=0 ppid=1859 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:40.933000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:39:40.937841 kubelet[1859]: I0517 00:39:40.937812 1859 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 17 00:39:40.940466 kubelet[1859]: I0517 00:39:40.940431 1859 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 17 00:39:40.941961 kubelet[1859]: I0517 00:39:40.941937 1859 factory.go:221] Registration of the containerd container factory successfully May 17 00:39:40.941961 kubelet[1859]: I0517 00:39:40.941954 1859 factory.go:221] Registration of the systemd container factory successfully May 17 00:39:40.946181 kubelet[1859]: E0517 00:39:40.946159 1859 kubelet.go:1555] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 17 00:39:40.950333 kubelet[1859]: E0517 00:39:40.950304 1859 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.200.4.18\" not found" node="10.200.4.18" May 17 00:39:40.956501 kubelet[1859]: I0517 00:39:40.956467 1859 cpu_manager.go:221] "Starting CPU manager" policy="none" May 17 00:39:40.956684 kubelet[1859]: I0517 00:39:40.956624 1859 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 17 00:39:40.956684 kubelet[1859]: I0517 00:39:40.956650 1859 state_mem.go:36] "Initialized new in-memory state store" May 17 00:39:40.961924 kubelet[1859]: I0517 00:39:40.961896 1859 policy_none.go:49] "None policy: Start" May 17 00:39:40.961924 kubelet[1859]: I0517 00:39:40.961928 1859 memory_manager.go:186] "Starting memorymanager" policy="None" May 17 00:39:40.962100 kubelet[1859]: I0517 00:39:40.961945 1859 state_mem.go:35] "Initializing new in-memory state store" May 17 00:39:40.969980 systemd[1]: Created slice kubepods.slice. May 17 00:39:40.980020 systemd[1]: Created slice kubepods-burstable.slice. May 17 00:39:40.983222 systemd[1]: Created slice kubepods-besteffort.slice. May 17 00:39:40.990357 kubelet[1859]: I0517 00:39:40.990328 1859 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 17 00:39:40.988000 audit[1859]: AVC avc: denied { mac_admin } for pid=1859 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:40.988000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:39:40.988000 audit[1859]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000dd4f90 a1=c00044aa08 a2=c000dd4f60 a3=25 items=0 ppid=1 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:40.988000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:39:40.990785 kubelet[1859]: I0517 00:39:40.990407 1859 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 17 00:39:40.990785 kubelet[1859]: I0517 00:39:40.990583 1859 eviction_manager.go:189] "Eviction manager: starting control loop" May 17 00:39:40.990785 kubelet[1859]: I0517 00:39:40.990602 1859 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 17 00:39:40.992555 kubelet[1859]: I0517 00:39:40.991847 1859 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 17 00:39:40.993466 kubelet[1859]: E0517 00:39:40.993447 1859 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 17 00:39:40.993696 kubelet[1859]: E0517 00:39:40.993681 1859 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.200.4.18\" not found" May 17 00:39:41.000000 audit[1883]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1883 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:39:41.000000 audit[1883]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffcfba6cad0 a2=0 a3=7ffcfba6cabc items=0 ppid=1859 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:41.000000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 17 00:39:41.002598 kubelet[1859]: I0517 00:39:41.002369 1859 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 17 00:39:41.002000 audit[1885]: NETFILTER_CFG table=mangle:10 family=10 entries=2 op=nft_register_chain pid=1885 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:39:41.002000 audit[1885]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe51fbaa20 a2=0 a3=7ffe51fbaa0c items=0 ppid=1859 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:41.002000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 00:39:41.004847 kubelet[1859]: I0517 00:39:41.004824 1859 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 17 00:39:41.003000 audit[1886]: NETFILTER_CFG table=mangle:11 family=2 entries=1 op=nft_register_chain pid=1886 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:39:41.003000 audit[1886]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd4ac459b0 a2=0 a3=7ffd4ac4599c items=0 ppid=1859 pid=1886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:41.003000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 00:39:41.005139 kubelet[1859]: I0517 00:39:41.005123 1859 status_manager.go:227] "Starting to sync pod status with apiserver" May 17 00:39:41.005200 kubelet[1859]: I0517 00:39:41.005169 1859 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 17 00:39:41.005200 kubelet[1859]: I0517 00:39:41.005181 1859 kubelet.go:2382] "Starting kubelet main sync loop" May 17 00:39:41.005322 kubelet[1859]: E0517 00:39:41.005302 1859 kubelet.go:2406] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" May 17 00:39:41.005000 audit[1888]: NETFILTER_CFG table=mangle:12 family=10 entries=1 op=nft_register_chain pid=1888 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:39:41.005000 audit[1888]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc93b45580 a2=0 a3=7ffc93b4556c items=0 ppid=1859 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:41.005000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 00:39:41.007000 audit[1890]: NETFILTER_CFG table=nat:13 family=10 entries=2 op=nft_register_chain pid=1890 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:39:41.007000 audit[1890]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff16796980 a2=0 a3=7fff1679696c items=0 ppid=1859 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:41.007000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 00:39:41.008000 audit[1887]: NETFILTER_CFG table=nat:14 family=2 entries=2 op=nft_register_chain pid=1887 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:39:41.008000 audit[1887]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffdb1718b90 a2=0 a3=7ffdb1718b7c items=0 ppid=1859 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:41.008000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 00:39:41.009000 audit[1891]: NETFILTER_CFG table=filter:15 family=10 entries=2 op=nft_register_chain pid=1891 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:39:41.009000 audit[1891]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffece20c550 a2=0 a3=7ffece20c53c items=0 ppid=1859 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:41.009000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 00:39:41.010000 audit[1892]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_chain pid=1892 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:39:41.010000 audit[1892]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe7d66ef70 a2=0 a3=7ffe7d66ef5c items=0 ppid=1859 pid=1892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:41.010000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 00:39:41.091999 kubelet[1859]: I0517 00:39:41.091953 1859 kubelet_node_status.go:75] "Attempting to register node" node="10.200.4.18" May 17 00:39:41.098887 kubelet[1859]: I0517 00:39:41.098850 1859 kubelet_node_status.go:78] "Successfully registered node" node="10.200.4.18" May 17 00:39:41.118711 kubelet[1859]: I0517 00:39:41.117230 1859 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" May 17 00:39:41.119332 env[1411]: time="2025-05-17T00:39:41.119207187Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 17 00:39:41.120201 kubelet[1859]: I0517 00:39:41.120175 1859 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" May 17 00:39:41.317430 sudo[1721]: pam_unix(sudo:session): session closed for user root May 17 00:39:41.315000 audit[1721]: USER_END pid=1721 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:39:41.320708 kernel: kauditd_printk_skb: 241 callbacks suppressed May 17 00:39:41.320830 kernel: audit: type=1106 audit(1747442381.315:428): pid=1721 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:39:41.316000 audit[1721]: CRED_DISP pid=1721 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:39:41.342549 kernel: audit: type=1104 audit(1747442381.316:429): pid=1721 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:39:41.421944 sshd[1718]: pam_unix(sshd:session): session closed for user core May 17 00:39:41.422000 audit[1718]: USER_END pid=1718 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:41.427700 systemd[1]: sshd@6-10.200.4.18:22-10.200.16.10:52468.service: Deactivated successfully. May 17 00:39:41.428433 systemd[1]: session-9.scope: Deactivated successfully. May 17 00:39:41.429806 systemd-logind[1398]: Session 9 logged out. Waiting for processes to exit. May 17 00:39:41.430933 systemd-logind[1398]: Removed session 9. May 17 00:39:41.422000 audit[1718]: CRED_DISP pid=1718 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:41.455012 kernel: audit: type=1106 audit(1747442381.422:430): pid=1718 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:41.455099 kernel: audit: type=1104 audit(1747442381.422:431): pid=1718 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:41.455144 kernel: audit: type=1131 audit(1747442381.426:432): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.4.18:22-10.200.16.10:52468 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:41.426000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.4.18:22-10.200.16.10:52468 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:41.867078 kubelet[1859]: I0517 00:39:41.867021 1859 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" May 17 00:39:41.867771 kubelet[1859]: W0517 00:39:41.867322 1859 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.Service ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 17 00:39:41.867771 kubelet[1859]: W0517 00:39:41.867729 1859 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 17 00:39:41.867771 kubelet[1859]: W0517 00:39:41.867769 1859 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.CSIDriver ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 17 00:39:41.912230 kubelet[1859]: I0517 00:39:41.912168 1859 apiserver.go:52] "Watching apiserver" May 17 00:39:41.912505 kubelet[1859]: E0517 00:39:41.912201 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:41.918143 kubelet[1859]: E0517 00:39:41.918098 1859 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nt72n" podUID="5c6f2d45-a691-4f43-862c-1793e0fd6dbb" May 17 00:39:41.924099 systemd[1]: Created slice kubepods-besteffort-podce01c01a_38b5_410f_8d83_aeb6347eb910.slice. May 17 00:39:41.936027 kubelet[1859]: I0517 00:39:41.935993 1859 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" May 17 00:39:41.939580 systemd[1]: Created slice kubepods-besteffort-podd5b65907_cfdc_4dde_ad88_4ede6ca0d00e.slice. May 17 00:39:41.946548 kubelet[1859]: I0517 00:39:41.946512 1859 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/ce01c01a-38b5-410f-8d83-aeb6347eb910-var-lib-calico\") pod \"calico-node-lzzdk\" (UID: \"ce01c01a-38b5-410f-8d83-aeb6347eb910\") " pod="calico-system/calico-node-lzzdk" May 17 00:39:41.946771 kubelet[1859]: I0517 00:39:41.946747 1859 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-g67jj\" (UniqueName: \"kubernetes.io/projected/ce01c01a-38b5-410f-8d83-aeb6347eb910-kube-api-access-g67jj\") pod \"calico-node-lzzdk\" (UID: \"ce01c01a-38b5-410f-8d83-aeb6347eb910\") " pod="calico-system/calico-node-lzzdk" May 17 00:39:41.946860 kubelet[1859]: I0517 00:39:41.946794 1859 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/5c6f2d45-a691-4f43-862c-1793e0fd6dbb-kubelet-dir\") pod \"csi-node-driver-nt72n\" (UID: \"5c6f2d45-a691-4f43-862c-1793e0fd6dbb\") " pod="calico-system/csi-node-driver-nt72n" May 17 00:39:41.946860 kubelet[1859]: I0517 00:39:41.946819 1859 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/ce01c01a-38b5-410f-8d83-aeb6347eb910-cni-net-dir\") pod \"calico-node-lzzdk\" (UID: \"ce01c01a-38b5-410f-8d83-aeb6347eb910\") " pod="calico-system/calico-node-lzzdk" May 17 00:39:41.946860 kubelet[1859]: I0517 00:39:41.946841 1859 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/ce01c01a-38b5-410f-8d83-aeb6347eb910-node-certs\") pod \"calico-node-lzzdk\" (UID: \"ce01c01a-38b5-410f-8d83-aeb6347eb910\") " pod="calico-system/calico-node-lzzdk" May 17 00:39:41.946996 kubelet[1859]: I0517 00:39:41.946875 1859 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/5c6f2d45-a691-4f43-862c-1793e0fd6dbb-registration-dir\") pod \"csi-node-driver-nt72n\" (UID: \"5c6f2d45-a691-4f43-862c-1793e0fd6dbb\") " pod="calico-system/csi-node-driver-nt72n" May 17 00:39:41.946996 kubelet[1859]: I0517 00:39:41.946898 1859 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/5c6f2d45-a691-4f43-862c-1793e0fd6dbb-socket-dir\") pod \"csi-node-driver-nt72n\" (UID: \"5c6f2d45-a691-4f43-862c-1793e0fd6dbb\") " pod="calico-system/csi-node-driver-nt72n" May 17 00:39:41.946996 kubelet[1859]: I0517 00:39:41.946922 1859 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-g2vf2\" (UniqueName: \"kubernetes.io/projected/5c6f2d45-a691-4f43-862c-1793e0fd6dbb-kube-api-access-g2vf2\") pod \"csi-node-driver-nt72n\" (UID: \"5c6f2d45-a691-4f43-862c-1793e0fd6dbb\") " pod="calico-system/csi-node-driver-nt72n" May 17 00:39:41.946996 kubelet[1859]: I0517 00:39:41.946961 1859 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/d5b65907-cfdc-4dde-ad88-4ede6ca0d00e-kube-proxy\") pod \"kube-proxy-fq998\" (UID: \"d5b65907-cfdc-4dde-ad88-4ede6ca0d00e\") " pod="kube-system/kube-proxy-fq998" May 17 00:39:41.946996 kubelet[1859]: I0517 00:39:41.946987 1859 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/ce01c01a-38b5-410f-8d83-aeb6347eb910-tigera-ca-bundle\") pod \"calico-node-lzzdk\" (UID: \"ce01c01a-38b5-410f-8d83-aeb6347eb910\") " pod="calico-system/calico-node-lzzdk" May 17 00:39:41.947192 kubelet[1859]: I0517 00:39:41.947009 1859 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/ce01c01a-38b5-410f-8d83-aeb6347eb910-xtables-lock\") pod \"calico-node-lzzdk\" (UID: \"ce01c01a-38b5-410f-8d83-aeb6347eb910\") " pod="calico-system/calico-node-lzzdk" May 17 00:39:41.947192 kubelet[1859]: I0517 00:39:41.947044 1859 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/ce01c01a-38b5-410f-8d83-aeb6347eb910-var-run-calico\") pod \"calico-node-lzzdk\" (UID: \"ce01c01a-38b5-410f-8d83-aeb6347eb910\") " pod="calico-system/calico-node-lzzdk" May 17 00:39:41.947192 kubelet[1859]: I0517 00:39:41.947066 1859 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/5c6f2d45-a691-4f43-862c-1793e0fd6dbb-varrun\") pod \"csi-node-driver-nt72n\" (UID: \"5c6f2d45-a691-4f43-862c-1793e0fd6dbb\") " pod="calico-system/csi-node-driver-nt72n" May 17 00:39:41.947192 kubelet[1859]: I0517 00:39:41.947087 1859 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/d5b65907-cfdc-4dde-ad88-4ede6ca0d00e-lib-modules\") pod \"kube-proxy-fq998\" (UID: \"d5b65907-cfdc-4dde-ad88-4ede6ca0d00e\") " pod="kube-system/kube-proxy-fq998" May 17 00:39:41.947192 kubelet[1859]: I0517 00:39:41.947125 1859 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/ce01c01a-38b5-410f-8d83-aeb6347eb910-cni-log-dir\") pod \"calico-node-lzzdk\" (UID: \"ce01c01a-38b5-410f-8d83-aeb6347eb910\") " pod="calico-system/calico-node-lzzdk" May 17 00:39:41.947385 kubelet[1859]: I0517 00:39:41.947149 1859 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/ce01c01a-38b5-410f-8d83-aeb6347eb910-flexvol-driver-host\") pod \"calico-node-lzzdk\" (UID: \"ce01c01a-38b5-410f-8d83-aeb6347eb910\") " pod="calico-system/calico-node-lzzdk" May 17 00:39:41.947385 kubelet[1859]: I0517 00:39:41.947170 1859 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/ce01c01a-38b5-410f-8d83-aeb6347eb910-policysync\") pod \"calico-node-lzzdk\" (UID: \"ce01c01a-38b5-410f-8d83-aeb6347eb910\") " pod="calico-system/calico-node-lzzdk" May 17 00:39:41.947385 kubelet[1859]: I0517 00:39:41.947207 1859 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/d5b65907-cfdc-4dde-ad88-4ede6ca0d00e-xtables-lock\") pod \"kube-proxy-fq998\" (UID: \"d5b65907-cfdc-4dde-ad88-4ede6ca0d00e\") " pod="kube-system/kube-proxy-fq998" May 17 00:39:41.947385 kubelet[1859]: I0517 00:39:41.947235 1859 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zw5hf\" (UniqueName: \"kubernetes.io/projected/d5b65907-cfdc-4dde-ad88-4ede6ca0d00e-kube-api-access-zw5hf\") pod \"kube-proxy-fq998\" (UID: \"d5b65907-cfdc-4dde-ad88-4ede6ca0d00e\") " pod="kube-system/kube-proxy-fq998" May 17 00:39:41.947385 kubelet[1859]: I0517 00:39:41.947269 1859 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/ce01c01a-38b5-410f-8d83-aeb6347eb910-cni-bin-dir\") pod \"calico-node-lzzdk\" (UID: \"ce01c01a-38b5-410f-8d83-aeb6347eb910\") " pod="calico-system/calico-node-lzzdk" May 17 00:39:41.947546 kubelet[1859]: I0517 00:39:41.947292 1859 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/ce01c01a-38b5-410f-8d83-aeb6347eb910-lib-modules\") pod \"calico-node-lzzdk\" (UID: \"ce01c01a-38b5-410f-8d83-aeb6347eb910\") " pod="calico-system/calico-node-lzzdk" May 17 00:39:42.049122 kubelet[1859]: E0517 00:39:42.049091 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:42.049292 kubelet[1859]: W0517 00:39:42.049232 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:42.049438 kubelet[1859]: E0517 00:39:42.049301 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:42.049638 kubelet[1859]: E0517 00:39:42.049617 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:42.049638 kubelet[1859]: W0517 00:39:42.049633 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:42.049802 kubelet[1859]: E0517 00:39:42.049662 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:42.049912 kubelet[1859]: E0517 00:39:42.049897 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:42.049912 kubelet[1859]: W0517 00:39:42.049910 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:42.050022 kubelet[1859]: E0517 00:39:42.049928 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:42.050217 kubelet[1859]: E0517 00:39:42.050199 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:42.050217 kubelet[1859]: W0517 00:39:42.050214 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:42.050359 kubelet[1859]: E0517 00:39:42.050234 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:42.050460 kubelet[1859]: E0517 00:39:42.050445 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:42.050460 kubelet[1859]: W0517 00:39:42.050457 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:42.050597 kubelet[1859]: E0517 00:39:42.050475 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:42.050704 kubelet[1859]: E0517 00:39:42.050690 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:42.050704 kubelet[1859]: W0517 00:39:42.050702 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:42.050839 kubelet[1859]: E0517 00:39:42.050785 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:42.050925 kubelet[1859]: E0517 00:39:42.050907 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:42.050925 kubelet[1859]: W0517 00:39:42.050923 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:42.051039 kubelet[1859]: E0517 00:39:42.051004 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:42.051145 kubelet[1859]: E0517 00:39:42.051132 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:42.051145 kubelet[1859]: W0517 00:39:42.051143 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:42.051278 kubelet[1859]: E0517 00:39:42.051224 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:42.051362 kubelet[1859]: E0517 00:39:42.051344 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:42.051362 kubelet[1859]: W0517 00:39:42.051357 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:42.051488 kubelet[1859]: E0517 00:39:42.051439 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:42.051589 kubelet[1859]: E0517 00:39:42.051559 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:42.051589 kubelet[1859]: W0517 00:39:42.051584 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:42.051725 kubelet[1859]: E0517 00:39:42.051672 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:42.051812 kubelet[1859]: E0517 00:39:42.051797 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:42.051812 kubelet[1859]: W0517 00:39:42.051809 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:42.051936 kubelet[1859]: E0517 00:39:42.051893 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:42.052032 kubelet[1859]: E0517 00:39:42.052018 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:42.052032 kubelet[1859]: W0517 00:39:42.052030 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:42.052141 kubelet[1859]: E0517 00:39:42.052115 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:42.052255 kubelet[1859]: E0517 00:39:42.052241 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:42.052255 kubelet[1859]: W0517 00:39:42.052253 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:42.052367 kubelet[1859]: E0517 00:39:42.052336 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:42.052469 kubelet[1859]: E0517 00:39:42.052453 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:42.052469 kubelet[1859]: W0517 00:39:42.052466 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:42.052613 kubelet[1859]: E0517 00:39:42.052545 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:42.052704 kubelet[1859]: E0517 00:39:42.052688 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:42.052704 kubelet[1859]: W0517 00:39:42.052700 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:42.052805 kubelet[1859]: E0517 00:39:42.052780 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:42.052917 kubelet[1859]: E0517 00:39:42.052901 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:42.052917 kubelet[1859]: W0517 00:39:42.052914 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:42.053014 kubelet[1859]: E0517 00:39:42.053001 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:42.053144 kubelet[1859]: E0517 00:39:42.053128 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:42.053212 kubelet[1859]: W0517 00:39:42.053145 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:42.053305 kubelet[1859]: E0517 00:39:42.053290 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:42.053390 kubelet[1859]: E0517 00:39:42.053326 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:42.053465 kubelet[1859]: W0517 00:39:42.053390 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:42.053552 kubelet[1859]: E0517 00:39:42.053538 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:42.053644 kubelet[1859]: E0517 00:39:42.053593 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:42.053707 kubelet[1859]: W0517 00:39:42.053684 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:42.053821 kubelet[1859]: E0517 00:39:42.053805 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:42.053887 kubelet[1859]: E0517 00:39:42.053872 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:42.053937 kubelet[1859]: W0517 00:39:42.053888 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:42.054015 kubelet[1859]: E0517 00:39:42.054002 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:42.054093 kubelet[1859]: E0517 00:39:42.054055 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:42.054154 kubelet[1859]: W0517 00:39:42.054133 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:42.054258 kubelet[1859]: E0517 00:39:42.054243 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:42.054339 kubelet[1859]: E0517 00:39:42.054322 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:42.054339 kubelet[1859]: W0517 00:39:42.054336 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:42.054433 kubelet[1859]: E0517 00:39:42.054417 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:42.054556 kubelet[1859]: E0517 00:39:42.054541 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:42.054556 kubelet[1859]: W0517 00:39:42.054553 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:42.054823 kubelet[1859]: E0517 00:39:42.054769 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:42.054823 kubelet[1859]: W0517 00:39:42.054779 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:42.054948 kubelet[1859]: E0517 00:39:42.054933 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:42.055006 kubelet[1859]: W0517 00:39:42.054950 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:42.055085 kubelet[1859]: E0517 00:39:42.055068 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:42.055157 kubelet[1859]: E0517 00:39:42.055138 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:42.055213 kubelet[1859]: E0517 00:39:42.054935 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:42.055213 kubelet[1859]: E0517 00:39:42.055127 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:42.055213 kubelet[1859]: W0517 00:39:42.055175 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:42.055349 kubelet[1859]: E0517 00:39:42.055339 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:42.055388 kubelet[1859]: W0517 00:39:42.055349 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:42.055466 kubelet[1859]: E0517 00:39:42.055443 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:42.055552 kubelet[1859]: E0517 00:39:42.055540 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:42.055644 kubelet[1859]: E0517 00:39:42.055544 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:42.055718 kubelet[1859]: W0517 00:39:42.055695 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:42.055820 kubelet[1859]: E0517 00:39:42.055805 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:42.055892 kubelet[1859]: E0517 00:39:42.055878 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:42.055942 kubelet[1859]: W0517 00:39:42.055894 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:42.056069 kubelet[1859]: E0517 00:39:42.056053 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:42.056123 kubelet[1859]: W0517 00:39:42.056110 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:42.056322 kubelet[1859]: E0517 00:39:42.056303 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:42.056322 kubelet[1859]: W0517 00:39:42.056321 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:42.056503 kubelet[1859]: E0517 00:39:42.056487 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:42.056578 kubelet[1859]: W0517 00:39:42.056504 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:42.056719 kubelet[1859]: E0517 00:39:42.056701 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:42.056780 kubelet[1859]: W0517 00:39:42.056719 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:42.056899 kubelet[1859]: E0517 00:39:42.056882 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:42.056962 kubelet[1859]: W0517 00:39:42.056899 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:42.057090 kubelet[1859]: E0517 00:39:42.057073 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:42.057155 kubelet[1859]: W0517 00:39:42.057091 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:42.057271 kubelet[1859]: E0517 00:39:42.057254 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:42.057332 kubelet[1859]: W0517 00:39:42.057271 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:42.057446 kubelet[1859]: E0517 00:39:42.057430 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:42.057503 kubelet[1859]: W0517 00:39:42.057447 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:42.057654 kubelet[1859]: E0517 00:39:42.057629 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:42.057654 kubelet[1859]: W0517 00:39:42.057650 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:42.057766 kubelet[1859]: E0517 00:39:42.057665 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:42.057908 kubelet[1859]: E0517 00:39:42.057890 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:42.057968 kubelet[1859]: W0517 00:39:42.057909 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:42.057968 kubelet[1859]: E0517 00:39:42.057922 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:42.057968 kubelet[1859]: E0517 00:39:42.057949 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:42.058189 kubelet[1859]: E0517 00:39:42.058143 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:42.058189 kubelet[1859]: W0517 00:39:42.058161 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:42.058189 kubelet[1859]: E0517 00:39:42.058173 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:42.058860 kubelet[1859]: I0517 00:39:42.058837 1859 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 17 00:39:42.059087 kubelet[1859]: E0517 00:39:42.059062 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:42.059153 kubelet[1859]: W0517 00:39:42.059087 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:42.059153 kubelet[1859]: E0517 00:39:42.059101 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:42.059333 kubelet[1859]: E0517 00:39:42.059312 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:42.059333 kubelet[1859]: W0517 00:39:42.059331 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:42.059428 kubelet[1859]: E0517 00:39:42.059344 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:42.059428 kubelet[1859]: E0517 00:39:42.059364 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:42.059629 kubelet[1859]: E0517 00:39:42.059612 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:42.059703 kubelet[1859]: W0517 00:39:42.059631 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:42.059703 kubelet[1859]: E0517 00:39:42.059645 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:42.059703 kubelet[1859]: E0517 00:39:42.059666 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:42.059908 kubelet[1859]: E0517 00:39:42.059889 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:42.059963 kubelet[1859]: W0517 00:39:42.059909 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:42.059963 kubelet[1859]: E0517 00:39:42.059922 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:42.059963 kubelet[1859]: E0517 00:39:42.059942 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:42.060191 kubelet[1859]: E0517 00:39:42.060174 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:42.060191 kubelet[1859]: W0517 00:39:42.060191 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:42.060296 kubelet[1859]: E0517 00:39:42.060203 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:42.060296 kubelet[1859]: E0517 00:39:42.060222 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:42.060450 kubelet[1859]: E0517 00:39:42.060432 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:42.060517 kubelet[1859]: W0517 00:39:42.060450 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:42.060517 kubelet[1859]: E0517 00:39:42.060463 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:42.060517 kubelet[1859]: E0517 00:39:42.060487 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:42.060941 kubelet[1859]: E0517 00:39:42.060920 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:42.061010 kubelet[1859]: W0517 00:39:42.060942 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:42.061010 kubelet[1859]: E0517 00:39:42.060956 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:42.061010 kubelet[1859]: E0517 00:39:42.060979 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:42.061193 kubelet[1859]: E0517 00:39:42.061177 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:42.061241 kubelet[1859]: W0517 00:39:42.061195 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:42.061241 kubelet[1859]: E0517 00:39:42.061207 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:42.064920 kubelet[1859]: E0517 00:39:42.064903 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:42.065037 kubelet[1859]: W0517 00:39:42.065023 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:42.065168 kubelet[1859]: E0517 00:39:42.065152 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:42.065287 kubelet[1859]: E0517 00:39:42.065271 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:42.065605 kubelet[1859]: E0517 00:39:42.065588 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:42.065699 kubelet[1859]: W0517 00:39:42.065686 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:42.065768 kubelet[1859]: E0517 00:39:42.065756 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:42.066082 kubelet[1859]: E0517 00:39:42.066064 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:42.066384 kubelet[1859]: E0517 00:39:42.066372 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:42.066462 kubelet[1859]: W0517 00:39:42.066451 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:42.066532 kubelet[1859]: E0517 00:39:42.066521 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:42.074223 kubelet[1859]: E0517 00:39:42.074197 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:42.074358 kubelet[1859]: W0517 00:39:42.074343 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:42.074470 kubelet[1859]: E0517 00:39:42.074455 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:42.083025 kubelet[1859]: E0517 00:39:42.082604 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:42.083025 kubelet[1859]: W0517 00:39:42.082623 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:42.083025 kubelet[1859]: E0517 00:39:42.082640 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:42.092478 kubelet[1859]: E0517 00:39:42.092451 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:42.092478 kubelet[1859]: W0517 00:39:42.092470 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:42.092678 kubelet[1859]: E0517 00:39:42.092491 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:42.239499 env[1411]: time="2025-05-17T00:39:42.238429895Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-lzzdk,Uid:ce01c01a-38b5-410f-8d83-aeb6347eb910,Namespace:calico-system,Attempt:0,}" May 17 00:39:42.245971 env[1411]: time="2025-05-17T00:39:42.245932308Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-fq998,Uid:d5b65907-cfdc-4dde-ad88-4ede6ca0d00e,Namespace:kube-system,Attempt:0,}" May 17 00:39:42.633073 kernel: hv_balloon: Max. dynamic memory size: 8192 MB May 17 00:39:42.913425 kubelet[1859]: E0517 00:39:42.913287 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:43.913678 kubelet[1859]: E0517 00:39:43.913622 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:44.006027 kubelet[1859]: E0517 00:39:44.005915 1859 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nt72n" podUID="5c6f2d45-a691-4f43-862c-1793e0fd6dbb" May 17 00:39:44.914822 kubelet[1859]: E0517 00:39:44.914756 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:45.915751 kubelet[1859]: E0517 00:39:45.915709 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:46.006332 kubelet[1859]: E0517 00:39:46.006265 1859 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nt72n" podUID="5c6f2d45-a691-4f43-862c-1793e0fd6dbb" May 17 00:39:46.127342 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount953458583.mount: Deactivated successfully. May 17 00:39:46.156183 env[1411]: time="2025-05-17T00:39:46.156125603Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:39:46.189148 env[1411]: time="2025-05-17T00:39:46.188537443Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:39:46.199838 env[1411]: time="2025-05-17T00:39:46.199794057Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:39:46.209482 env[1411]: time="2025-05-17T00:39:46.209429469Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:39:46.213030 env[1411]: time="2025-05-17T00:39:46.212990174Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:39:46.216540 env[1411]: time="2025-05-17T00:39:46.216504378Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:39:46.221548 env[1411]: time="2025-05-17T00:39:46.221510984Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:39:46.230452 env[1411]: time="2025-05-17T00:39:46.230410995Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:39:46.295625 env[1411]: time="2025-05-17T00:39:46.295539577Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:39:46.295792 env[1411]: time="2025-05-17T00:39:46.295629277Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:39:46.295792 env[1411]: time="2025-05-17T00:39:46.295647877Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:39:46.295904 env[1411]: time="2025-05-17T00:39:46.295800677Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d2d4a425574ba03ab9579bb27defcbc03d8460b6d714f1b345b2d9f8ba2f76b4 pid=1961 runtime=io.containerd.runc.v2 May 17 00:39:46.318234 systemd[1]: Started cri-containerd-d2d4a425574ba03ab9579bb27defcbc03d8460b6d714f1b345b2d9f8ba2f76b4.scope. May 17 00:39:46.328869 env[1411]: time="2025-05-17T00:39:46.327166517Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:39:46.328869 env[1411]: time="2025-05-17T00:39:46.327208017Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:39:46.328869 env[1411]: time="2025-05-17T00:39:46.327222517Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:39:46.328869 env[1411]: time="2025-05-17T00:39:46.327357317Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e4cbeae7ccb90b562369927667561544ad9cbc5ee3c558e66fb6c9318cdc383e pid=1988 runtime=io.containerd.runc.v2 May 17 00:39:46.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.358788 kernel: audit: type=1400 audit(1747442386.344:433): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.370729 kernel: audit: type=1400 audit(1747442386.344:434): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.362494 systemd[1]: Started cri-containerd-e4cbeae7ccb90b562369927667561544ad9cbc5ee3c558e66fb6c9318cdc383e.scope. May 17 00:39:46.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.386091 kernel: audit: type=1400 audit(1747442386.344:435): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.400585 kernel: audit: type=1400 audit(1747442386.344:436): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.421530 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 17 00:39:46.421685 kernel: audit: type=1400 audit(1747442386.344:437): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.421713 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 May 17 00:39:46.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.428081 env[1411]: time="2025-05-17T00:39:46.428036843Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-fq998,Uid:d5b65907-cfdc-4dde-ad88-4ede6ca0d00e,Namespace:kube-system,Attempt:0,} returns sandbox id \"d2d4a425574ba03ab9579bb27defcbc03d8460b6d714f1b345b2d9f8ba2f76b4\"" May 17 00:39:46.441803 kernel: audit: backlog limit exceeded May 17 00:39:46.441983 kernel: audit: type=1400 audit(1747442386.344:438): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.443093 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 17 00:39:46.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.445225 env[1411]: time="2025-05-17T00:39:46.445191364Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.5\"" May 17 00:39:46.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.344000 audit: BPF prog-id=62 op=LOAD May 17 00:39:46.350000 audit[1970]: AVC avc: denied { bpf } for pid=1970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.350000 audit[1970]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1961 pid=1970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:46.350000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432643461343235353734626130336162393537396262323764656663 May 17 00:39:46.350000 audit[1970]: AVC avc: denied { perfmon } for pid=1970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.350000 audit[1970]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1961 pid=1970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:46.350000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432643461343235353734626130336162393537396262323764656663 May 17 00:39:46.350000 audit[1970]: AVC avc: denied { bpf } for pid=1970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.350000 audit[1970]: AVC avc: denied { bpf } for pid=1970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.350000 audit[1970]: AVC avc: denied { bpf } for pid=1970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.350000 audit[1970]: AVC avc: denied { perfmon } for pid=1970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.350000 audit[1970]: AVC avc: denied { perfmon } for pid=1970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.350000 audit[1970]: AVC avc: denied { perfmon } for pid=1970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.350000 audit[1970]: AVC avc: denied { perfmon } for pid=1970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.350000 audit[1970]: AVC avc: denied { perfmon } for pid=1970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.350000 audit[1970]: AVC avc: denied { bpf } for pid=1970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.350000 audit[1970]: AVC avc: denied { bpf } for pid=1970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.350000 audit: BPF prog-id=63 op=LOAD May 17 00:39:46.350000 audit[1970]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d4bd0 items=0 ppid=1961 pid=1970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:46.350000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432643461343235353734626130336162393537396262323764656663 May 17 00:39:46.369000 audit[1970]: AVC avc: denied { bpf } for pid=1970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.369000 audit[1970]: AVC avc: denied { bpf } for pid=1970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.369000 audit[1970]: AVC avc: denied { perfmon } for pid=1970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.369000 audit[1970]: AVC avc: denied { perfmon } for pid=1970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.369000 audit[1970]: AVC avc: denied { perfmon } for pid=1970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.369000 audit[1970]: AVC avc: denied { perfmon } for pid=1970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.369000 audit[1970]: AVC avc: denied { perfmon } for pid=1970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.369000 audit[1970]: AVC avc: denied { bpf } for pid=1970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.369000 audit[1970]: AVC avc: denied { bpf } for pid=1970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.369000 audit: BPF prog-id=64 op=LOAD May 17 00:39:46.369000 audit[1970]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d4c18 items=0 ppid=1961 pid=1970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:46.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432643461343235353734626130336162393537396262323764656663 May 17 00:39:46.369000 audit: BPF prog-id=64 op=UNLOAD May 17 00:39:46.369000 audit: BPF prog-id=63 op=UNLOAD May 17 00:39:46.369000 audit[1970]: AVC avc: denied { bpf } for pid=1970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.369000 audit[1970]: AVC avc: denied { bpf } for pid=1970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.369000 audit[1970]: AVC avc: denied { bpf } for pid=1970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.369000 audit[1970]: AVC avc: denied { perfmon } for pid=1970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.369000 audit[1970]: AVC avc: denied { perfmon } for pid=1970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.369000 audit[1970]: AVC avc: denied { perfmon } for pid=1970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.369000 audit[1970]: AVC avc: denied { perfmon } for pid=1970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.369000 audit[1970]: AVC avc: denied { perfmon } for pid=1970 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.369000 audit[1970]: AVC avc: denied { bpf } for pid=1970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.369000 audit[1970]: AVC avc: denied { bpf } for pid=1970 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.369000 audit: BPF prog-id=65 op=LOAD May 17 00:39:46.369000 audit[1970]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001d5028 items=0 ppid=1961 pid=1970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:46.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432643461343235353734626130336162393537396262323764656663 May 17 00:39:46.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.440000 audit: BPF prog-id=66 op=LOAD May 17 00:39:46.445000 audit[1999]: AVC avc: denied { perfmon } for pid=1999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.445000 audit[1999]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=1988 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:46.445000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534636265616537636362393062353632333639393237363637353631 May 17 00:39:46.445000 audit[1999]: AVC avc: denied { bpf } for pid=1999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.445000 audit[1999]: AVC avc: denied { bpf } for pid=1999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.445000 audit[1999]: AVC avc: denied { bpf } for pid=1999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.445000 audit[1999]: AVC avc: denied { perfmon } for pid=1999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.445000 audit[1999]: AVC avc: denied { perfmon } for pid=1999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.445000 audit[1999]: AVC avc: denied { perfmon } for pid=1999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.445000 audit[1999]: AVC avc: denied { perfmon } for pid=1999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.445000 audit[1999]: AVC avc: denied { perfmon } for pid=1999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.445000 audit[1999]: AVC avc: denied { bpf } for pid=1999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.445000 audit[1999]: AVC avc: denied { bpf } for pid=1999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.445000 audit: BPF prog-id=67 op=LOAD May 17 00:39:46.445000 audit[1999]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c0002f31a0 items=0 ppid=1988 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:46.445000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534636265616537636362393062353632333639393237363637353631 May 17 00:39:46.445000 audit[1999]: AVC avc: denied { bpf } for pid=1999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.445000 audit[1999]: AVC avc: denied { bpf } for pid=1999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.445000 audit[1999]: AVC avc: denied { perfmon } for pid=1999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.445000 audit[1999]: AVC avc: denied { perfmon } for pid=1999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.445000 audit[1999]: AVC avc: denied { perfmon } for pid=1999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.445000 audit[1999]: AVC avc: denied { perfmon } for pid=1999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.445000 audit[1999]: AVC avc: denied { perfmon } for pid=1999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.445000 audit[1999]: AVC avc: denied { bpf } for pid=1999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.445000 audit[1999]: AVC avc: denied { bpf } for pid=1999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.445000 audit: BPF prog-id=68 op=LOAD May 17 00:39:46.445000 audit[1999]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c0002f31e8 items=0 ppid=1988 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:46.445000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534636265616537636362393062353632333639393237363637353631 May 17 00:39:46.446000 audit: BPF prog-id=68 op=UNLOAD May 17 00:39:46.446000 audit: BPF prog-id=67 op=UNLOAD May 17 00:39:46.446000 audit[1999]: AVC avc: denied { bpf } for pid=1999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.446000 audit[1999]: AVC avc: denied { bpf } for pid=1999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.446000 audit[1999]: AVC avc: denied { bpf } for pid=1999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.446000 audit[1999]: AVC avc: denied { perfmon } for pid=1999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.446000 audit[1999]: AVC avc: denied { perfmon } for pid=1999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.446000 audit[1999]: AVC avc: denied { perfmon } for pid=1999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.446000 audit[1999]: AVC avc: denied { perfmon } for pid=1999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.446000 audit[1999]: AVC avc: denied { perfmon } for pid=1999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.446000 audit[1999]: AVC avc: denied { bpf } for pid=1999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.446000 audit[1999]: AVC avc: denied { bpf } for pid=1999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:46.446000 audit: BPF prog-id=69 op=LOAD May 17 00:39:46.446000 audit[1999]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c0002f35f8 items=0 ppid=1988 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:46.446000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534636265616537636362393062353632333639393237363637353631 May 17 00:39:46.461638 env[1411]: time="2025-05-17T00:39:46.461535485Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-lzzdk,Uid:ce01c01a-38b5-410f-8d83-aeb6347eb910,Namespace:calico-system,Attempt:0,} returns sandbox id \"e4cbeae7ccb90b562369927667561544ad9cbc5ee3c558e66fb6c9318cdc383e\"" May 17 00:39:46.916629 kubelet[1859]: E0517 00:39:46.916554 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:47.903270 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount188642733.mount: Deactivated successfully. May 17 00:39:47.916929 kubelet[1859]: E0517 00:39:47.916865 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:48.006677 kubelet[1859]: E0517 00:39:48.006208 1859 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nt72n" podUID="5c6f2d45-a691-4f43-862c-1793e0fd6dbb" May 17 00:39:48.571739 env[1411]: time="2025-05-17T00:39:48.571674161Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:39:48.582912 env[1411]: time="2025-05-17T00:39:48.582854373Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f532b7356fac4d7c4e4f6763bb5a15a43e3bb740c9fb26c85b906a4d971f2363,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:39:48.593474 env[1411]: time="2025-05-17T00:39:48.593428685Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:39:48.597684 env[1411]: time="2025-05-17T00:39:48.597632089Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:9dc6553459c3319525ba4090a780db1a133d5dee68c08e07f9b9d6ba83b42a0b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:39:48.598127 env[1411]: time="2025-05-17T00:39:48.598092290Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.5\" returns image reference \"sha256:f532b7356fac4d7c4e4f6763bb5a15a43e3bb740c9fb26c85b906a4d971f2363\"" May 17 00:39:48.601612 env[1411]: time="2025-05-17T00:39:48.599715691Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\"" May 17 00:39:48.606944 env[1411]: time="2025-05-17T00:39:48.606903599Z" level=info msg="CreateContainer within sandbox \"d2d4a425574ba03ab9579bb27defcbc03d8460b6d714f1b345b2d9f8ba2f76b4\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 17 00:39:48.636699 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1848818089.mount: Deactivated successfully. May 17 00:39:48.644358 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2212304514.mount: Deactivated successfully. May 17 00:39:48.660899 env[1411]: time="2025-05-17T00:39:48.660847259Z" level=info msg="CreateContainer within sandbox \"d2d4a425574ba03ab9579bb27defcbc03d8460b6d714f1b345b2d9f8ba2f76b4\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"ca74e51dd85dda5e572a200d6af2d7e0bec2e002d8c8babf09d5891ddc92efe5\"" May 17 00:39:48.661923 env[1411]: time="2025-05-17T00:39:48.661886860Z" level=info msg="StartContainer for \"ca74e51dd85dda5e572a200d6af2d7e0bec2e002d8c8babf09d5891ddc92efe5\"" May 17 00:39:48.684407 systemd[1]: Started cri-containerd-ca74e51dd85dda5e572a200d6af2d7e0bec2e002d8c8babf09d5891ddc92efe5.scope. May 17 00:39:48.700000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:48.700000 audit[2044]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fe768421608 items=0 ppid=1961 pid=2044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:48.700000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361373465353164643835646461356535373261323030643661663264 May 17 00:39:48.700000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:48.700000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:48.700000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:48.700000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:48.700000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:48.700000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:48.700000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:48.700000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:48.700000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:48.700000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:48.700000 audit: BPF prog-id=70 op=LOAD May 17 00:39:48.700000 audit[2044]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000265fa8 items=0 ppid=1961 pid=2044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:48.700000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361373465353164643835646461356535373261323030643661663264 May 17 00:39:48.700000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:48.700000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:48.700000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:48.700000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:48.700000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:48.700000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:48.700000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:48.700000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:48.700000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:48.700000 audit: BPF prog-id=71 op=LOAD May 17 00:39:48.700000 audit[2044]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000265ff8 items=0 ppid=1961 pid=2044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:48.700000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361373465353164643835646461356535373261323030643661663264 May 17 00:39:48.700000 audit: BPF prog-id=71 op=UNLOAD May 17 00:39:48.700000 audit: BPF prog-id=70 op=UNLOAD May 17 00:39:48.700000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:48.700000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:48.700000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:48.700000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:48.700000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:48.700000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:48.700000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:48.700000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:48.700000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:48.700000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:48.700000 audit: BPF prog-id=72 op=LOAD May 17 00:39:48.700000 audit[2044]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003c2088 items=0 ppid=1961 pid=2044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:48.700000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361373465353164643835646461356535373261323030643661663264 May 17 00:39:48.731509 env[1411]: time="2025-05-17T00:39:48.731454236Z" level=info msg="StartContainer for \"ca74e51dd85dda5e572a200d6af2d7e0bec2e002d8c8babf09d5891ddc92efe5\" returns successfully" May 17 00:39:48.844000 audit[2102]: NETFILTER_CFG table=mangle:17 family=2 entries=1 op=nft_register_chain pid=2102 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:39:48.844000 audit[2102]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe2e05dbf0 a2=0 a3=7ffe2e05dbdc items=0 ppid=2054 pid=2102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:48.844000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:39:48.846000 audit[2103]: NETFILTER_CFG table=mangle:18 family=10 entries=1 op=nft_register_chain pid=2103 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:39:48.846000 audit[2103]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe6ad06f00 a2=0 a3=7ffe6ad06eec items=0 ppid=2054 pid=2103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:48.846000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:39:48.848000 audit[2105]: NETFILTER_CFG table=nat:19 family=2 entries=1 op=nft_register_chain pid=2105 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:39:48.848000 audit[2105]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdc4cdaf50 a2=0 a3=7ffdc4cdaf3c items=0 ppid=2054 pid=2105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:48.848000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:39:48.850000 audit[2106]: NETFILTER_CFG table=nat:20 family=10 entries=1 op=nft_register_chain pid=2106 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:39:48.850000 audit[2106]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe39cc1c70 a2=0 a3=7ffe39cc1c5c items=0 ppid=2054 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:48.850000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:39:48.851000 audit[2107]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_chain pid=2107 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:39:48.851000 audit[2107]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc00473960 a2=0 a3=7ffc0047394c items=0 ppid=2054 pid=2107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:48.851000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 00:39:48.852000 audit[2108]: NETFILTER_CFG table=filter:22 family=10 entries=1 op=nft_register_chain pid=2108 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:39:48.852000 audit[2108]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffa5803d10 a2=0 a3=7fffa5803cfc items=0 ppid=2054 pid=2108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:48.852000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 00:39:48.917248 kubelet[1859]: E0517 00:39:48.917185 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:48.944000 audit[2109]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2109 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:39:48.944000 audit[2109]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe326dcae0 a2=0 a3=7ffe326dcacc items=0 ppid=2054 pid=2109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:48.944000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 00:39:48.946000 audit[2111]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2111 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:39:48.946000 audit[2111]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc16db5300 a2=0 a3=7ffc16db52ec items=0 ppid=2054 pid=2111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:48.946000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 17 00:39:48.950000 audit[2114]: NETFILTER_CFG table=filter:25 family=2 entries=2 op=nft_register_chain pid=2114 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:39:48.950000 audit[2114]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcefee6560 a2=0 a3=7ffcefee654c items=0 ppid=2054 pid=2114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:48.950000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 17 00:39:48.951000 audit[2115]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_chain pid=2115 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:39:48.951000 audit[2115]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd929edb00 a2=0 a3=7ffd929edaec items=0 ppid=2054 pid=2115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:48.951000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 00:39:48.954000 audit[2117]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2117 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:39:48.954000 audit[2117]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd0e822030 a2=0 a3=7ffd0e82201c items=0 ppid=2054 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:48.954000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 00:39:48.955000 audit[2118]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2118 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:39:48.955000 audit[2118]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcbc322a00 a2=0 a3=7ffcbc3229ec items=0 ppid=2054 pid=2118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:48.955000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 00:39:48.957000 audit[2120]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2120 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:39:48.957000 audit[2120]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe3c9fc080 a2=0 a3=7ffe3c9fc06c items=0 ppid=2054 pid=2120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:48.957000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 00:39:48.961000 audit[2123]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2123 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:39:48.961000 audit[2123]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc2cd94cd0 a2=0 a3=7ffc2cd94cbc items=0 ppid=2054 pid=2123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:48.961000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 17 00:39:48.962000 audit[2124]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_chain pid=2124 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:39:48.962000 audit[2124]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe63e13d60 a2=0 a3=7ffe63e13d4c items=0 ppid=2054 pid=2124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:48.962000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 00:39:48.964000 audit[2126]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2126 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:39:48.964000 audit[2126]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd6a43b230 a2=0 a3=7ffd6a43b21c items=0 ppid=2054 pid=2126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:48.964000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 00:39:48.966000 audit[2127]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_chain pid=2127 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:39:48.966000 audit[2127]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc6d9ce510 a2=0 a3=7ffc6d9ce4fc items=0 ppid=2054 pid=2127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:48.966000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 00:39:48.968000 audit[2129]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_rule pid=2129 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:39:48.968000 audit[2129]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff3332c1e0 a2=0 a3=7fff3332c1cc items=0 ppid=2054 pid=2129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:48.968000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:39:48.972000 audit[2132]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_rule pid=2132 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:39:48.972000 audit[2132]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff3866b5a0 a2=0 a3=7fff3866b58c items=0 ppid=2054 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:48.972000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:39:48.976000 audit[2135]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_rule pid=2135 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:39:48.976000 audit[2135]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffde0b93f90 a2=0 a3=7ffde0b93f7c items=0 ppid=2054 pid=2135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:48.976000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 00:39:48.977000 audit[2136]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2136 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:39:48.977000 audit[2136]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff5cffbc30 a2=0 a3=7fff5cffbc1c items=0 ppid=2054 pid=2136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:48.977000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 00:39:49.039205 kubelet[1859]: I0517 00:39:49.039139 1859 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-fq998" podStartSLOduration=5.884485444 podStartE2EDuration="8.039122772s" podCreationTimestamp="2025-05-17 00:39:41 +0000 UTC" firstStartedPulling="2025-05-17 00:39:46.444585863 +0000 UTC m=+6.660928453" lastFinishedPulling="2025-05-17 00:39:48.599223191 +0000 UTC m=+8.815565781" observedRunningTime="2025-05-17 00:39:49.038821072 +0000 UTC m=+9.255163662" watchObservedRunningTime="2025-05-17 00:39:49.039122772 +0000 UTC m=+9.255465362" May 17 00:39:48.980000 audit[2138]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2138 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:39:48.980000 audit[2138]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffdf20bbe40 a2=0 a3=7ffdf20bbe2c items=0 ppid=2054 pid=2138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:48.980000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:39:49.053000 audit[2142]: NETFILTER_CFG table=nat:39 family=2 entries=2 op=nft_register_chain pid=2142 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:39:49.053000 audit[2142]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffcaa9ee420 a2=0 a3=7ffcaa9ee40c items=0 ppid=2054 pid=2142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:49.053000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:39:49.054000 audit[2143]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2143 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:39:49.054000 audit[2143]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc38f47cc0 a2=0 a3=7ffc38f47cac items=0 ppid=2054 pid=2143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:49.054000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 00:39:49.057000 audit[2145]: NETFILTER_CFG table=nat:41 family=2 entries=2 op=nft_register_chain pid=2145 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:39:49.057000 audit[2145]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe047635f0 a2=0 a3=7ffe047635dc items=0 ppid=2054 pid=2145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:49.057000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 00:39:49.105615 kubelet[1859]: E0517 00:39:49.105488 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:49.105615 kubelet[1859]: W0517 00:39:49.105522 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:49.105615 kubelet[1859]: E0517 00:39:49.105550 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:49.105906 kubelet[1859]: E0517 00:39:49.105802 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:49.105906 kubelet[1859]: W0517 00:39:49.105822 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:49.105906 kubelet[1859]: E0517 00:39:49.105838 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:49.106061 kubelet[1859]: E0517 00:39:49.106041 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:49.106061 kubelet[1859]: W0517 00:39:49.106052 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:49.106154 kubelet[1859]: E0517 00:39:49.106064 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:49.108861 kubelet[1859]: E0517 00:39:49.106325 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:49.108861 kubelet[1859]: W0517 00:39:49.106339 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:49.108861 kubelet[1859]: E0517 00:39:49.106360 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:49.108861 kubelet[1859]: E0517 00:39:49.106845 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:49.108861 kubelet[1859]: W0517 00:39:49.106858 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:49.108861 kubelet[1859]: E0517 00:39:49.106871 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:49.108861 kubelet[1859]: E0517 00:39:49.107212 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:49.108861 kubelet[1859]: W0517 00:39:49.107223 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:49.108861 kubelet[1859]: E0517 00:39:49.107276 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:49.108861 kubelet[1859]: E0517 00:39:49.107524 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:49.109399 kubelet[1859]: W0517 00:39:49.107541 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:49.109399 kubelet[1859]: E0517 00:39:49.107553 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:49.109399 kubelet[1859]: E0517 00:39:49.107890 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:49.109399 kubelet[1859]: W0517 00:39:49.107909 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:49.109399 kubelet[1859]: E0517 00:39:49.107922 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:49.109399 kubelet[1859]: E0517 00:39:49.108179 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:49.109399 kubelet[1859]: W0517 00:39:49.108191 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:49.109399 kubelet[1859]: E0517 00:39:49.108211 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:49.109399 kubelet[1859]: E0517 00:39:49.108497 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:49.109399 kubelet[1859]: W0517 00:39:49.108507 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:49.109856 kubelet[1859]: E0517 00:39:49.108519 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:49.109856 kubelet[1859]: E0517 00:39:49.108771 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:49.109856 kubelet[1859]: W0517 00:39:49.108781 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:49.109856 kubelet[1859]: E0517 00:39:49.108833 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:49.109856 kubelet[1859]: E0517 00:39:49.109057 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:49.109856 kubelet[1859]: W0517 00:39:49.109068 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:49.109856 kubelet[1859]: E0517 00:39:49.109080 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:49.109856 kubelet[1859]: E0517 00:39:49.109286 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:49.109856 kubelet[1859]: W0517 00:39:49.109296 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:49.109856 kubelet[1859]: E0517 00:39:49.109308 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:49.110323 kubelet[1859]: E0517 00:39:49.109491 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:49.110323 kubelet[1859]: W0517 00:39:49.109501 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:49.110323 kubelet[1859]: E0517 00:39:49.109512 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:49.110323 kubelet[1859]: E0517 00:39:49.109707 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:49.110323 kubelet[1859]: W0517 00:39:49.109718 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:49.110323 kubelet[1859]: E0517 00:39:49.109729 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:49.110323 kubelet[1859]: E0517 00:39:49.109907 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:49.110323 kubelet[1859]: W0517 00:39:49.109916 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:49.110323 kubelet[1859]: E0517 00:39:49.109929 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:49.110323 kubelet[1859]: E0517 00:39:49.110127 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:49.110747 kubelet[1859]: W0517 00:39:49.110138 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:49.110747 kubelet[1859]: E0517 00:39:49.110152 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:49.110747 kubelet[1859]: E0517 00:39:49.110469 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:49.110747 kubelet[1859]: W0517 00:39:49.110479 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:49.110747 kubelet[1859]: E0517 00:39:49.110491 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:49.111944 kubelet[1859]: E0517 00:39:49.111645 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:49.111944 kubelet[1859]: W0517 00:39:49.111661 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:49.111944 kubelet[1859]: E0517 00:39:49.111677 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:49.111944 kubelet[1859]: E0517 00:39:49.111873 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:49.111944 kubelet[1859]: W0517 00:39:49.111882 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:49.111944 kubelet[1859]: E0517 00:39:49.111894 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:49.136000 audit[2151]: NETFILTER_CFG table=filter:42 family=2 entries=7 op=nft_register_rule pid=2151 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:39:49.136000 audit[2151]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7fff19471570 a2=0 a3=7fff1947155c items=0 ppid=2054 pid=2151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:49.136000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:39:49.205866 kubelet[1859]: E0517 00:39:49.205831 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:49.205866 kubelet[1859]: W0517 00:39:49.205859 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:49.206105 kubelet[1859]: E0517 00:39:49.205884 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:49.206192 kubelet[1859]: E0517 00:39:49.206173 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:49.206250 kubelet[1859]: W0517 00:39:49.206192 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:49.206250 kubelet[1859]: E0517 00:39:49.206210 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:49.206452 kubelet[1859]: E0517 00:39:49.206435 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:49.206452 kubelet[1859]: W0517 00:39:49.206449 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:49.206614 kubelet[1859]: E0517 00:39:49.206468 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:49.206735 kubelet[1859]: E0517 00:39:49.206717 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:49.206735 kubelet[1859]: W0517 00:39:49.206731 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:49.206836 kubelet[1859]: E0517 00:39:49.206752 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:49.206970 kubelet[1859]: E0517 00:39:49.206956 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:49.207039 kubelet[1859]: W0517 00:39:49.206968 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:49.207039 kubelet[1859]: E0517 00:39:49.206988 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:49.207265 kubelet[1859]: E0517 00:39:49.207249 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:49.207265 kubelet[1859]: W0517 00:39:49.207262 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:49.207389 kubelet[1859]: E0517 00:39:49.207363 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:49.207746 kubelet[1859]: E0517 00:39:49.207593 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:49.207746 kubelet[1859]: W0517 00:39:49.207619 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:49.207746 kubelet[1859]: E0517 00:39:49.207634 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:49.207951 kubelet[1859]: E0517 00:39:49.207855 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:49.207951 kubelet[1859]: W0517 00:39:49.207866 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:49.207951 kubelet[1859]: E0517 00:39:49.207884 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:49.208102 kubelet[1859]: E0517 00:39:49.208089 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:49.208102 kubelet[1859]: W0517 00:39:49.208099 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:49.208185 kubelet[1859]: E0517 00:39:49.208115 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:49.208370 kubelet[1859]: E0517 00:39:49.208353 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:49.208370 kubelet[1859]: W0517 00:39:49.208366 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:49.208485 kubelet[1859]: E0517 00:39:49.208384 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:49.208793 kubelet[1859]: E0517 00:39:49.208776 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:49.208793 kubelet[1859]: W0517 00:39:49.208790 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:49.208937 kubelet[1859]: E0517 00:39:49.208809 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:49.209026 kubelet[1859]: E0517 00:39:49.209009 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:49.209026 kubelet[1859]: W0517 00:39:49.209023 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:49.209108 kubelet[1859]: E0517 00:39:49.209036 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:49.230000 audit[2151]: NETFILTER_CFG table=nat:43 family=2 entries=65 op=nft_register_chain pid=2151 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:39:49.230000 audit[2151]: SYSCALL arch=c000003e syscall=46 success=yes exit=30940 a0=3 a1=7fff19471570 a2=0 a3=7fff1947155c items=0 ppid=2054 pid=2151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:49.230000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:39:49.262000 audit[2192]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2192 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:39:49.262000 audit[2192]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe673d1770 a2=0 a3=7ffe673d175c items=0 ppid=2054 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:49.262000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 00:39:49.265000 audit[2194]: NETFILTER_CFG table=filter:45 family=10 entries=2 op=nft_register_chain pid=2194 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:39:49.265000 audit[2194]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcb9efcf20 a2=0 a3=7ffcb9efcf0c items=0 ppid=2054 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:49.265000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 17 00:39:49.270000 audit[2197]: NETFILTER_CFG table=filter:46 family=10 entries=2 op=nft_register_chain pid=2197 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:39:49.270000 audit[2197]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffda9bcc920 a2=0 a3=7ffda9bcc90c items=0 ppid=2054 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:49.270000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 17 00:39:49.272000 audit[2198]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_chain pid=2198 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:39:49.272000 audit[2198]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff17d16590 a2=0 a3=7fff17d1657c items=0 ppid=2054 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:49.272000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 00:39:49.275000 audit[2200]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_rule pid=2200 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:39:49.275000 audit[2200]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff1fb44950 a2=0 a3=7fff1fb4493c items=0 ppid=2054 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:49.275000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 00:39:49.276000 audit[2201]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2201 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:39:49.276000 audit[2201]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd79e56470 a2=0 a3=7ffd79e5645c items=0 ppid=2054 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:49.276000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 00:39:49.279000 audit[2203]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2203 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:39:49.279000 audit[2203]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffdc5ba7e0 a2=0 a3=7fffdc5ba7cc items=0 ppid=2054 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:49.279000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 17 00:39:49.282000 audit[2206]: NETFILTER_CFG table=filter:51 family=10 entries=2 op=nft_register_chain pid=2206 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:39:49.282000 audit[2206]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffff4d13840 a2=0 a3=7ffff4d1382c items=0 ppid=2054 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:49.282000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 00:39:49.284000 audit[2207]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_chain pid=2207 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:39:49.284000 audit[2207]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff08e3e3c0 a2=0 a3=7fff08e3e3ac items=0 ppid=2054 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:49.284000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 00:39:49.286000 audit[2209]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2209 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:39:49.286000 audit[2209]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffccc853b40 a2=0 a3=7ffccc853b2c items=0 ppid=2054 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:49.286000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 00:39:49.287000 audit[2210]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_chain pid=2210 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:39:49.287000 audit[2210]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff4c402e80 a2=0 a3=7fff4c402e6c items=0 ppid=2054 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:49.287000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 00:39:49.290000 audit[2212]: NETFILTER_CFG table=filter:55 family=10 entries=1 op=nft_register_rule pid=2212 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:39:49.290000 audit[2212]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe2f0b3860 a2=0 a3=7ffe2f0b384c items=0 ppid=2054 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:49.290000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:39:49.294000 audit[2215]: NETFILTER_CFG table=filter:56 family=10 entries=1 op=nft_register_rule pid=2215 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:39:49.294000 audit[2215]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdfb2d5df0 a2=0 a3=7ffdfb2d5ddc items=0 ppid=2054 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:49.294000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 00:39:49.298000 audit[2218]: NETFILTER_CFG table=filter:57 family=10 entries=1 op=nft_register_rule pid=2218 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:39:49.298000 audit[2218]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc7323ed00 a2=0 a3=7ffc7323ecec items=0 ppid=2054 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:49.298000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 17 00:39:49.299000 audit[2219]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=2219 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:39:49.299000 audit[2219]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd60e75ff0 a2=0 a3=7ffd60e75fdc items=0 ppid=2054 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:49.299000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 00:39:49.301000 audit[2221]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2221 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:39:49.301000 audit[2221]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe5936b7f0 a2=0 a3=7ffe5936b7dc items=0 ppid=2054 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:49.301000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:39:49.306000 audit[2224]: NETFILTER_CFG table=nat:60 family=10 entries=2 op=nft_register_chain pid=2224 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:39:49.306000 audit[2224]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffeb0433010 a2=0 a3=7ffeb0432ffc items=0 ppid=2054 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:49.306000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:39:49.307000 audit[2225]: NETFILTER_CFG table=nat:61 family=10 entries=1 op=nft_register_chain pid=2225 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:39:49.307000 audit[2225]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdf30e7090 a2=0 a3=7ffdf30e707c items=0 ppid=2054 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:49.307000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 00:39:49.309000 audit[2227]: NETFILTER_CFG table=nat:62 family=10 entries=2 op=nft_register_chain pid=2227 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:39:49.309000 audit[2227]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff33a6b1c0 a2=0 a3=7fff33a6b1ac items=0 ppid=2054 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:49.309000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 00:39:49.311000 audit[2228]: NETFILTER_CFG table=filter:63 family=10 entries=1 op=nft_register_chain pid=2228 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:39:49.311000 audit[2228]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff87d94da0 a2=0 a3=7fff87d94d8c items=0 ppid=2054 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:49.311000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 00:39:49.313000 audit[2230]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_rule pid=2230 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:39:49.313000 audit[2230]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffddacd3640 a2=0 a3=7ffddacd362c items=0 ppid=2054 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:49.313000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:39:49.317000 audit[2233]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_rule pid=2233 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:39:49.317000 audit[2233]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff15e863d0 a2=0 a3=7fff15e863bc items=0 ppid=2054 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:49.317000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:39:49.320000 audit[2235]: NETFILTER_CFG table=filter:66 family=10 entries=3 op=nft_register_rule pid=2235 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 00:39:49.320000 audit[2235]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7fffb5b6b420 a2=0 a3=7fffb5b6b40c items=0 ppid=2054 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:49.320000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:39:49.320000 audit[2235]: NETFILTER_CFG table=nat:67 family=10 entries=7 op=nft_register_chain pid=2235 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 00:39:49.320000 audit[2235]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fffb5b6b420 a2=0 a3=7fffb5b6b40c items=0 ppid=2054 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:49.320000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:39:49.917391 kubelet[1859]: E0517 00:39:49.917352 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:50.005232 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2712272434.mount: Deactivated successfully. May 17 00:39:50.006407 kubelet[1859]: E0517 00:39:50.006338 1859 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nt72n" podUID="5c6f2d45-a691-4f43-862c-1793e0fd6dbb" May 17 00:39:50.120601 kubelet[1859]: E0517 00:39:50.119554 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:50.120601 kubelet[1859]: W0517 00:39:50.119590 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:50.120601 kubelet[1859]: E0517 00:39:50.119613 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:50.120601 kubelet[1859]: E0517 00:39:50.119794 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:50.120601 kubelet[1859]: W0517 00:39:50.119802 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:50.120601 kubelet[1859]: E0517 00:39:50.119813 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:50.120601 kubelet[1859]: E0517 00:39:50.119971 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:50.120601 kubelet[1859]: W0517 00:39:50.119979 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:50.120601 kubelet[1859]: E0517 00:39:50.119989 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:50.120601 kubelet[1859]: E0517 00:39:50.120150 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:50.121144 kubelet[1859]: W0517 00:39:50.120159 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:50.121144 kubelet[1859]: E0517 00:39:50.120169 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:50.121144 kubelet[1859]: E0517 00:39:50.120340 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:50.121144 kubelet[1859]: W0517 00:39:50.120349 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:50.121144 kubelet[1859]: E0517 00:39:50.120360 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:50.121144 kubelet[1859]: E0517 00:39:50.120512 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:50.121144 kubelet[1859]: W0517 00:39:50.120522 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:50.121144 kubelet[1859]: E0517 00:39:50.120533 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:50.122290 kubelet[1859]: E0517 00:39:50.121658 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:50.122290 kubelet[1859]: W0517 00:39:50.121672 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:50.122290 kubelet[1859]: E0517 00:39:50.121687 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:50.122290 kubelet[1859]: E0517 00:39:50.121853 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:50.122290 kubelet[1859]: W0517 00:39:50.121861 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:50.122290 kubelet[1859]: E0517 00:39:50.121870 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:50.122290 kubelet[1859]: E0517 00:39:50.122026 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:50.122290 kubelet[1859]: W0517 00:39:50.122033 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:50.122290 kubelet[1859]: E0517 00:39:50.122042 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:50.122290 kubelet[1859]: E0517 00:39:50.122203 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:50.122776 kubelet[1859]: W0517 00:39:50.122211 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:50.122776 kubelet[1859]: E0517 00:39:50.122222 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:50.123425 kubelet[1859]: E0517 00:39:50.122989 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:50.123425 kubelet[1859]: W0517 00:39:50.123002 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:50.123425 kubelet[1859]: E0517 00:39:50.123016 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:50.123425 kubelet[1859]: E0517 00:39:50.123202 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:50.123425 kubelet[1859]: W0517 00:39:50.123211 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:50.123425 kubelet[1859]: E0517 00:39:50.123222 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:50.124066 kubelet[1859]: E0517 00:39:50.123404 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:50.124066 kubelet[1859]: W0517 00:39:50.123785 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:50.124066 kubelet[1859]: E0517 00:39:50.123801 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:50.124066 kubelet[1859]: E0517 00:39:50.123979 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:50.124066 kubelet[1859]: W0517 00:39:50.123988 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:50.124066 kubelet[1859]: E0517 00:39:50.123999 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:50.124612 kubelet[1859]: E0517 00:39:50.124434 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:50.124612 kubelet[1859]: W0517 00:39:50.124446 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:50.124612 kubelet[1859]: E0517 00:39:50.124461 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:50.124931 kubelet[1859]: E0517 00:39:50.124823 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:50.124931 kubelet[1859]: W0517 00:39:50.124835 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:50.124931 kubelet[1859]: E0517 00:39:50.124847 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:50.125275 kubelet[1859]: E0517 00:39:50.125178 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:50.125275 kubelet[1859]: W0517 00:39:50.125190 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:50.125275 kubelet[1859]: E0517 00:39:50.125203 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:50.125539 kubelet[1859]: E0517 00:39:50.125529 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:50.125737 kubelet[1859]: W0517 00:39:50.125643 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:50.125737 kubelet[1859]: E0517 00:39:50.125663 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:50.125957 kubelet[1859]: E0517 00:39:50.125947 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:50.126035 kubelet[1859]: W0517 00:39:50.126023 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:50.126169 kubelet[1859]: E0517 00:39:50.126096 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:50.126334 kubelet[1859]: E0517 00:39:50.126324 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:50.126410 kubelet[1859]: W0517 00:39:50.126400 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:50.126479 kubelet[1859]: E0517 00:39:50.126469 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:50.167089 env[1411]: time="2025-05-17T00:39:50.167032624Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:39:50.175432 env[1411]: time="2025-05-17T00:39:50.175323932Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c53606cea03e59dcbfa981dc43a55dff05952895f72576b8389fa00be09ab676,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:39:50.179754 env[1411]: time="2025-05-17T00:39:50.179717837Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:39:50.183758 env[1411]: time="2025-05-17T00:39:50.183726441Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:ce76dd87f11d3fd0054c35ad2e0e9f833748d007f77a9bfe859d0ddcb66fcb2c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:39:50.184221 env[1411]: time="2025-05-17T00:39:50.184188741Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\" returns image reference \"sha256:c53606cea03e59dcbfa981dc43a55dff05952895f72576b8389fa00be09ab676\"" May 17 00:39:50.186433 env[1411]: time="2025-05-17T00:39:50.186403143Z" level=info msg="CreateContainer within sandbox \"e4cbeae7ccb90b562369927667561544ad9cbc5ee3c558e66fb6c9318cdc383e\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 17 00:39:50.212333 kubelet[1859]: E0517 00:39:50.212294 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:50.212333 kubelet[1859]: W0517 00:39:50.212318 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:50.212580 kubelet[1859]: E0517 00:39:50.212345 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:50.212679 kubelet[1859]: E0517 00:39:50.212657 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:50.212679 kubelet[1859]: W0517 00:39:50.212675 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:50.212803 kubelet[1859]: E0517 00:39:50.212697 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:50.213007 kubelet[1859]: E0517 00:39:50.212986 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:50.213007 kubelet[1859]: W0517 00:39:50.213001 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:50.213161 kubelet[1859]: E0517 00:39:50.213022 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:50.213266 kubelet[1859]: E0517 00:39:50.213251 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:50.213266 kubelet[1859]: W0517 00:39:50.213264 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:50.213392 kubelet[1859]: E0517 00:39:50.213289 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:50.213525 kubelet[1859]: E0517 00:39:50.213499 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:50.213525 kubelet[1859]: W0517 00:39:50.213513 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:50.213664 kubelet[1859]: E0517 00:39:50.213532 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:50.213844 kubelet[1859]: E0517 00:39:50.213827 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:50.213844 kubelet[1859]: W0517 00:39:50.213843 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:50.213968 kubelet[1859]: E0517 00:39:50.213942 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:50.214354 kubelet[1859]: E0517 00:39:50.214334 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:50.214354 kubelet[1859]: W0517 00:39:50.214349 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:50.214511 kubelet[1859]: E0517 00:39:50.214368 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:50.214639 kubelet[1859]: E0517 00:39:50.214624 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:50.214639 kubelet[1859]: W0517 00:39:50.214637 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:50.214781 kubelet[1859]: E0517 00:39:50.214661 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:50.214901 kubelet[1859]: E0517 00:39:50.214882 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:50.214969 kubelet[1859]: W0517 00:39:50.214905 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:50.214969 kubelet[1859]: E0517 00:39:50.214923 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:50.215194 kubelet[1859]: E0517 00:39:50.215176 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:50.215194 kubelet[1859]: W0517 00:39:50.215190 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:50.215365 kubelet[1859]: E0517 00:39:50.215207 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:50.215635 kubelet[1859]: E0517 00:39:50.215609 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:50.215635 kubelet[1859]: W0517 00:39:50.215624 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:50.215836 kubelet[1859]: E0517 00:39:50.215783 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:50.215836 kubelet[1859]: E0517 00:39:50.215804 1859 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:39:50.215836 kubelet[1859]: W0517 00:39:50.215814 1859 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:39:50.215836 kubelet[1859]: E0517 00:39:50.215825 1859 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:39:50.218079 env[1411]: time="2025-05-17T00:39:50.218038474Z" level=info msg="CreateContainer within sandbox \"e4cbeae7ccb90b562369927667561544ad9cbc5ee3c558e66fb6c9318cdc383e\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"3a6dfb00dd13da14126de66ba9f6df77908d4f3adc8eed04bee5c626bb279a74\"" May 17 00:39:50.218819 env[1411]: time="2025-05-17T00:39:50.218733574Z" level=info msg="StartContainer for \"3a6dfb00dd13da14126de66ba9f6df77908d4f3adc8eed04bee5c626bb279a74\"" May 17 00:39:50.237518 systemd[1]: Started cri-containerd-3a6dfb00dd13da14126de66ba9f6df77908d4f3adc8eed04bee5c626bb279a74.scope. May 17 00:39:50.253000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:50.253000 audit[2275]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f94bc0b1a68 items=0 ppid=1988 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:50.253000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361366466623030646431336461313431323664653636626139663664 May 17 00:39:50.253000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:50.253000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:50.253000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:50.253000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:50.253000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:50.253000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:50.253000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:50.253000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:50.253000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:50.253000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:50.253000 audit: BPF prog-id=73 op=LOAD May 17 00:39:50.253000 audit[2275]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c000273c58 items=0 ppid=1988 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:50.253000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361366466623030646431336461313431323664653636626139663664 May 17 00:39:50.253000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:50.253000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:50.253000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:50.253000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:50.253000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:50.253000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:50.253000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:50.253000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:50.253000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:50.253000 audit: BPF prog-id=74 op=LOAD May 17 00:39:50.253000 audit[2275]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c000273ca8 items=0 ppid=1988 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:50.253000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361366466623030646431336461313431323664653636626139663664 May 17 00:39:50.253000 audit: BPF prog-id=74 op=UNLOAD May 17 00:39:50.253000 audit: BPF prog-id=73 op=UNLOAD May 17 00:39:50.253000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:50.253000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:50.253000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:50.253000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:50.253000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:50.253000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:50.253000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:50.253000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:50.253000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:50.253000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:50.253000 audit: BPF prog-id=75 op=LOAD May 17 00:39:50.253000 audit[2275]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c000273d38 items=0 ppid=1988 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:50.253000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361366466623030646431336461313431323664653636626139663664 May 17 00:39:50.274684 env[1411]: time="2025-05-17T00:39:50.274591328Z" level=info msg="StartContainer for \"3a6dfb00dd13da14126de66ba9f6df77908d4f3adc8eed04bee5c626bb279a74\" returns successfully" May 17 00:39:50.280278 systemd[1]: cri-containerd-3a6dfb00dd13da14126de66ba9f6df77908d4f3adc8eed04bee5c626bb279a74.scope: Deactivated successfully. May 17 00:39:50.283000 audit: BPF prog-id=75 op=UNLOAD May 17 00:39:50.635002 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-3a6dfb00dd13da14126de66ba9f6df77908d4f3adc8eed04bee5c626bb279a74-rootfs.mount: Deactivated successfully. May 17 00:39:50.918403 kubelet[1859]: E0517 00:39:50.918263 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:51.339263 env[1411]: time="2025-05-17T00:39:51.339206637Z" level=info msg="shim disconnected" id=3a6dfb00dd13da14126de66ba9f6df77908d4f3adc8eed04bee5c626bb279a74 May 17 00:39:51.339263 env[1411]: time="2025-05-17T00:39:51.339261137Z" level=warning msg="cleaning up after shim disconnected" id=3a6dfb00dd13da14126de66ba9f6df77908d4f3adc8eed04bee5c626bb279a74 namespace=k8s.io May 17 00:39:51.339263 env[1411]: time="2025-05-17T00:39:51.339277937Z" level=info msg="cleaning up dead shim" May 17 00:39:51.348087 env[1411]: time="2025-05-17T00:39:51.348041745Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:39:51Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2319 runtime=io.containerd.runc.v2\n" May 17 00:39:51.609347 update_engine[1399]: I0517 00:39:51.609155 1399 update_attempter.cc:509] Updating boot flags... May 17 00:39:51.918611 kubelet[1859]: E0517 00:39:51.918447 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:52.006340 kubelet[1859]: E0517 00:39:52.006269 1859 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nt72n" podUID="5c6f2d45-a691-4f43-862c-1793e0fd6dbb" May 17 00:39:52.033541 env[1411]: time="2025-05-17T00:39:52.033484164Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\"" May 17 00:39:52.918837 kubelet[1859]: E0517 00:39:52.918782 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:53.919131 kubelet[1859]: E0517 00:39:53.919062 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:54.006911 kubelet[1859]: E0517 00:39:54.006547 1859 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nt72n" podUID="5c6f2d45-a691-4f43-862c-1793e0fd6dbb" May 17 00:39:54.920195 kubelet[1859]: E0517 00:39:54.920131 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:55.464279 env[1411]: time="2025-05-17T00:39:55.464218354Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:39:55.471215 env[1411]: time="2025-05-17T00:39:55.471164559Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:15f996c472622f23047ea38b2d72940e8c34d0996b8a2e12a1f255c1d7083185,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:39:55.475729 env[1411]: time="2025-05-17T00:39:55.475688962Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:39:55.479628 env[1411]: time="2025-05-17T00:39:55.479588264Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:3dd06656abdc03fbd51782d5f6fe4d70e6825a1c0c5bce2a165bbd2ff9e0f7df,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:39:55.480027 env[1411]: time="2025-05-17T00:39:55.479990465Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\" returns image reference \"sha256:15f996c472622f23047ea38b2d72940e8c34d0996b8a2e12a1f255c1d7083185\"" May 17 00:39:55.482514 env[1411]: time="2025-05-17T00:39:55.482479566Z" level=info msg="CreateContainer within sandbox \"e4cbeae7ccb90b562369927667561544ad9cbc5ee3c558e66fb6c9318cdc383e\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 17 00:39:55.513760 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3000365261.mount: Deactivated successfully. May 17 00:39:55.531001 env[1411]: time="2025-05-17T00:39:55.530947900Z" level=info msg="CreateContainer within sandbox \"e4cbeae7ccb90b562369927667561544ad9cbc5ee3c558e66fb6c9318cdc383e\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"df9107ac0bfe04106dd0b5c09b2714bb2ffc01e192d83fc6ccc81795938fee74\"" May 17 00:39:55.531521 env[1411]: time="2025-05-17T00:39:55.531488601Z" level=info msg="StartContainer for \"df9107ac0bfe04106dd0b5c09b2714bb2ffc01e192d83fc6ccc81795938fee74\"" May 17 00:39:55.561555 systemd[1]: Started cri-containerd-df9107ac0bfe04106dd0b5c09b2714bb2ffc01e192d83fc6ccc81795938fee74.scope. May 17 00:39:55.577000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:55.582833 kernel: kauditd_printk_skb: 346 callbacks suppressed May 17 00:39:55.582940 kernel: audit: type=1400 audit(1747442395.577:531): avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:55.611155 kernel: audit: type=1300 audit(1747442395.577:531): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7fb9f5117ba8 items=0 ppid=1988 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:55.611309 kernel: audit: type=1327 audit(1747442395.577:531): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466393130376163306266653034313036646430623563303962323731 May 17 00:39:55.577000 audit[2404]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7fb9f5117ba8 items=0 ppid=1988 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:55.577000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466393130376163306266653034313036646430623563303962323731 May 17 00:39:55.638917 kernel: audit: type=1400 audit(1747442395.577:532): avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:55.577000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:55.577000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:55.651591 kernel: audit: type=1400 audit(1747442395.577:532): avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:55.577000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:55.668898 kernel: audit: type=1400 audit(1747442395.577:532): avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:55.669003 kernel: audit: type=1400 audit(1747442395.577:532): avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:55.577000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:55.577000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:55.687353 kernel: audit: type=1400 audit(1747442395.577:532): avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:55.687656 kernel: audit: type=1400 audit(1747442395.577:532): avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:55.577000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:55.700087 env[1411]: time="2025-05-17T00:39:55.700032919Z" level=info msg="StartContainer for \"df9107ac0bfe04106dd0b5c09b2714bb2ffc01e192d83fc6ccc81795938fee74\" returns successfully" May 17 00:39:55.577000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:55.577000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:55.577000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:55.577000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:55.577000 audit: BPF prog-id=76 op=LOAD May 17 00:39:55.577000 audit[2404]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001499d8 a2=78 a3=c00038eda8 items=0 ppid=1988 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:55.577000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466393130376163306266653034313036646430623563303962323731 May 17 00:39:55.592000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:55.592000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:55.592000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:55.592000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:55.592000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:55.592000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:55.715604 kernel: audit: type=1400 audit(1747442395.577:532): avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:55.592000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:55.592000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:55.592000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:55.592000 audit: BPF prog-id=77 op=LOAD May 17 00:39:55.592000 audit[2404]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000149770 a2=78 a3=c00038edf8 items=0 ppid=1988 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:55.592000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466393130376163306266653034313036646430623563303962323731 May 17 00:39:55.625000 audit: BPF prog-id=77 op=UNLOAD May 17 00:39:55.625000 audit: BPF prog-id=76 op=UNLOAD May 17 00:39:55.625000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:55.625000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:55.625000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:55.625000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:55.625000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:55.625000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:55.625000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:55.625000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:55.625000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:55.625000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:39:55.625000 audit: BPF prog-id=78 op=LOAD May 17 00:39:55.625000 audit[2404]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000149c30 a2=78 a3=c00038ee88 items=0 ppid=1988 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:55.625000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466393130376163306266653034313036646430623563303962323731 May 17 00:39:55.920718 kubelet[1859]: E0517 00:39:55.920653 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:56.006000 kubelet[1859]: E0517 00:39:56.005942 1859 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nt72n" podUID="5c6f2d45-a691-4f43-862c-1793e0fd6dbb" May 17 00:39:56.510974 systemd[1]: run-containerd-runc-k8s.io-df9107ac0bfe04106dd0b5c09b2714bb2ffc01e192d83fc6ccc81795938fee74-runc.3aItnF.mount: Deactivated successfully. May 17 00:39:56.921201 kubelet[1859]: E0517 00:39:56.921051 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:57.310040 env[1411]: time="2025-05-17T00:39:57.309961776Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 17 00:39:57.312314 systemd[1]: cri-containerd-df9107ac0bfe04106dd0b5c09b2714bb2ffc01e192d83fc6ccc81795938fee74.scope: Deactivated successfully. May 17 00:39:57.315000 audit: BPF prog-id=78 op=UNLOAD May 17 00:39:57.332655 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-df9107ac0bfe04106dd0b5c09b2714bb2ffc01e192d83fc6ccc81795938fee74-rootfs.mount: Deactivated successfully. May 17 00:39:57.374302 kubelet[1859]: I0517 00:39:57.374268 1859 kubelet_node_status.go:501] "Fast updating node status as it just became ready" May 17 00:39:57.940475 kubelet[1859]: E0517 00:39:57.921896 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:58.011230 systemd[1]: Created slice kubepods-besteffort-pod5c6f2d45_a691_4f43_862c_1793e0fd6dbb.slice. May 17 00:39:58.013811 env[1411]: time="2025-05-17T00:39:58.013767008Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-nt72n,Uid:5c6f2d45-a691-4f43-862c-1793e0fd6dbb,Namespace:calico-system,Attempt:0,}" May 17 00:39:58.582106 env[1411]: time="2025-05-17T00:39:58.582041536Z" level=info msg="shim disconnected" id=df9107ac0bfe04106dd0b5c09b2714bb2ffc01e192d83fc6ccc81795938fee74 May 17 00:39:58.582106 env[1411]: time="2025-05-17T00:39:58.582100936Z" level=warning msg="cleaning up after shim disconnected" id=df9107ac0bfe04106dd0b5c09b2714bb2ffc01e192d83fc6ccc81795938fee74 namespace=k8s.io May 17 00:39:58.582106 env[1411]: time="2025-05-17T00:39:58.582114836Z" level=info msg="cleaning up dead shim" May 17 00:39:58.600190 env[1411]: time="2025-05-17T00:39:58.600136647Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:39:58Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2444 runtime=io.containerd.runc.v2\n" May 17 00:39:58.646548 env[1411]: time="2025-05-17T00:39:58.646471373Z" level=error msg="Failed to destroy network for sandbox \"d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:39:58.647965 env[1411]: time="2025-05-17T00:39:58.647909974Z" level=error msg="encountered an error cleaning up failed sandbox \"d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:39:58.648183 env[1411]: time="2025-05-17T00:39:58.648146074Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-nt72n,Uid:5c6f2d45-a691-4f43-862c-1793e0fd6dbb,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:39:58.648984 kubelet[1859]: E0517 00:39:58.648496 1859 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:39:58.648984 kubelet[1859]: E0517 00:39:58.648593 1859 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-nt72n" May 17 00:39:58.648984 kubelet[1859]: E0517 00:39:58.648631 1859 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-nt72n" May 17 00:39:58.649213 kubelet[1859]: E0517 00:39:58.648689 1859 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-nt72n_calico-system(5c6f2d45-a691-4f43-862c-1793e0fd6dbb)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-nt72n_calico-system(5c6f2d45-a691-4f43-862c-1793e0fd6dbb)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-nt72n" podUID="5c6f2d45-a691-4f43-862c-1793e0fd6dbb" May 17 00:39:58.649615 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e-shm.mount: Deactivated successfully. May 17 00:39:58.922238 kubelet[1859]: E0517 00:39:58.922086 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:59.048844 env[1411]: time="2025-05-17T00:39:59.048295503Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\"" May 17 00:39:59.049021 kubelet[1859]: I0517 00:39:59.048322 1859 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e" May 17 00:39:59.049780 env[1411]: time="2025-05-17T00:39:59.049633304Z" level=info msg="StopPodSandbox for \"d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e\"" May 17 00:39:59.077197 env[1411]: time="2025-05-17T00:39:59.077132119Z" level=error msg="StopPodSandbox for \"d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e\" failed" error="failed to destroy network for sandbox \"d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:39:59.077439 kubelet[1859]: E0517 00:39:59.077396 1859 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e" May 17 00:39:59.077549 kubelet[1859]: E0517 00:39:59.077487 1859 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e"} May 17 00:39:59.077619 kubelet[1859]: E0517 00:39:59.077585 1859 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5c6f2d45-a691-4f43-862c-1793e0fd6dbb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:39:59.077709 kubelet[1859]: E0517 00:39:59.077619 1859 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5c6f2d45-a691-4f43-862c-1793e0fd6dbb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-nt72n" podUID="5c6f2d45-a691-4f43-862c-1793e0fd6dbb" May 17 00:39:59.922252 kubelet[1859]: E0517 00:39:59.922195 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:00.911698 kubelet[1859]: E0517 00:40:00.911631 1859 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:00.923303 kubelet[1859]: E0517 00:40:00.923248 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:01.923432 kubelet[1859]: E0517 00:40:01.923381 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:02.407754 systemd[1]: Created slice kubepods-besteffort-pod9f88e28f_2a3c_4227_88be_aeaa28287898.slice. May 17 00:40:02.498879 kubelet[1859]: I0517 00:40:02.498836 1859 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-x24jz\" (UniqueName: \"kubernetes.io/projected/9f88e28f-2a3c-4227-88be-aeaa28287898-kube-api-access-x24jz\") pod \"nginx-deployment-7fcdb87857-9kkwx\" (UID: \"9f88e28f-2a3c-4227-88be-aeaa28287898\") " pod="default/nginx-deployment-7fcdb87857-9kkwx" May 17 00:40:02.712073 env[1411]: time="2025-05-17T00:40:02.711592410Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-9kkwx,Uid:9f88e28f-2a3c-4227-88be-aeaa28287898,Namespace:default,Attempt:0,}" May 17 00:40:02.827862 env[1411]: time="2025-05-17T00:40:02.827794395Z" level=error msg="Failed to destroy network for sandbox \"c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:40:02.831693 env[1411]: time="2025-05-17T00:40:02.830410446Z" level=error msg="encountered an error cleaning up failed sandbox \"c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:40:02.831693 env[1411]: time="2025-05-17T00:40:02.830491056Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-9kkwx,Uid:9f88e28f-2a3c-4227-88be-aeaa28287898,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:40:02.831825 kubelet[1859]: E0517 00:40:02.830757 1859 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:40:02.831825 kubelet[1859]: E0517 00:40:02.830824 1859 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-9kkwx" May 17 00:40:02.831825 kubelet[1859]: E0517 00:40:02.830854 1859 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-9kkwx" May 17 00:40:02.830111 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab-shm.mount: Deactivated successfully. May 17 00:40:02.832005 kubelet[1859]: E0517 00:40:02.830907 1859 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-7fcdb87857-9kkwx_default(9f88e28f-2a3c-4227-88be-aeaa28287898)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-7fcdb87857-9kkwx_default(9f88e28f-2a3c-4227-88be-aeaa28287898)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-9kkwx" podUID="9f88e28f-2a3c-4227-88be-aeaa28287898" May 17 00:40:02.924191 kubelet[1859]: E0517 00:40:02.924141 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:03.065558 kubelet[1859]: I0517 00:40:03.065519 1859 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab" May 17 00:40:03.066320 env[1411]: time="2025-05-17T00:40:03.066271638Z" level=info msg="StopPodSandbox for \"c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab\"" May 17 00:40:03.092513 env[1411]: time="2025-05-17T00:40:03.092450551Z" level=error msg="StopPodSandbox for \"c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab\" failed" error="failed to destroy network for sandbox \"c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:40:03.092805 kubelet[1859]: E0517 00:40:03.092753 1859 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab" May 17 00:40:03.092805 kubelet[1859]: E0517 00:40:03.092824 1859 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab"} May 17 00:40:03.092805 kubelet[1859]: E0517 00:40:03.092879 1859 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9f88e28f-2a3c-4227-88be-aeaa28287898\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:40:03.093138 kubelet[1859]: E0517 00:40:03.092912 1859 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9f88e28f-2a3c-4227-88be-aeaa28287898\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-9kkwx" podUID="9f88e28f-2a3c-4227-88be-aeaa28287898" May 17 00:40:03.925386 kubelet[1859]: E0517 00:40:03.925292 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:04.925947 kubelet[1859]: E0517 00:40:04.925892 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:05.926433 kubelet[1859]: E0517 00:40:05.926355 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:06.927472 kubelet[1859]: E0517 00:40:06.927422 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:07.635978 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3619654644.mount: Deactivated successfully. May 17 00:40:07.682731 env[1411]: time="2025-05-17T00:40:07.682675299Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:07.690372 env[1411]: time="2025-05-17T00:40:07.690324191Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d12dae9bc0999225efe30fd5618bcf2195709d54ed2840234f5006aab5f7d721,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:07.695422 env[1411]: time="2025-05-17T00:40:07.695382281Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:07.708409 env[1411]: time="2025-05-17T00:40:07.708362094Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:7cb61ea47ca0a8e6d0526a42da4f1e399b37ccd13339d0776d272465cb7ee012,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:07.708864 env[1411]: time="2025-05-17T00:40:07.708830049Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\" returns image reference \"sha256:d12dae9bc0999225efe30fd5618bcf2195709d54ed2840234f5006aab5f7d721\"" May 17 00:40:07.722539 env[1411]: time="2025-05-17T00:40:07.722492642Z" level=info msg="CreateContainer within sandbox \"e4cbeae7ccb90b562369927667561544ad9cbc5ee3c558e66fb6c9318cdc383e\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 17 00:40:07.763766 env[1411]: time="2025-05-17T00:40:07.763708649Z" level=info msg="CreateContainer within sandbox \"e4cbeae7ccb90b562369927667561544ad9cbc5ee3c558e66fb6c9318cdc383e\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"c96b2900b3d8070e4c3026e5dcdf7e1c6fd309f4a5671a7704edd4e65939a264\"" May 17 00:40:07.764353 env[1411]: time="2025-05-17T00:40:07.764301718Z" level=info msg="StartContainer for \"c96b2900b3d8070e4c3026e5dcdf7e1c6fd309f4a5671a7704edd4e65939a264\"" May 17 00:40:07.783806 systemd[1]: Started cri-containerd-c96b2900b3d8070e4c3026e5dcdf7e1c6fd309f4a5671a7704edd4e65939a264.scope. May 17 00:40:07.802000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:07.807230 kernel: kauditd_printk_skb: 34 callbacks suppressed May 17 00:40:07.807332 kernel: audit: type=1400 audit(1747442407.802:538): avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:07.802000 audit[2547]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7feaf07601b8 items=0 ppid=1988 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:07.838740 kernel: audit: type=1300 audit(1747442407.802:538): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7feaf07601b8 items=0 ppid=1988 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:07.838919 kernel: audit: type=1327 audit(1747442407.802:538): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339366232393030623364383037306534633330323665356463646637 May 17 00:40:07.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339366232393030623364383037306534633330323665356463646637 May 17 00:40:07.810000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:07.868211 kernel: audit: type=1400 audit(1747442407.810:539): avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:07.868345 kernel: audit: type=1400 audit(1747442407.810:539): avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:07.810000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:07.810000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:07.891703 kernel: audit: type=1400 audit(1747442407.810:539): avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:07.892078 kernel: audit: type=1400 audit(1747442407.810:539): avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:07.810000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:07.810000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:07.916652 kernel: audit: type=1400 audit(1747442407.810:539): avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:07.810000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:07.931445 kubelet[1859]: E0517 00:40:07.931393 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:07.931928 kernel: audit: type=1400 audit(1747442407.810:539): avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:07.810000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:07.810000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:07.810000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:07.810000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:07.810000 audit: BPF prog-id=79 op=LOAD May 17 00:40:07.945998 kernel: audit: type=1400 audit(1747442407.810:539): avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:07.810000 audit[2547]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c00025fba8 items=0 ppid=1988 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:07.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339366232393030623364383037306534633330323665356463646637 May 17 00:40:07.820000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:07.820000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:07.820000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:07.820000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:07.820000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:07.820000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:07.820000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:07.820000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:07.820000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:07.820000 audit: BPF prog-id=80 op=LOAD May 17 00:40:07.820000 audit[2547]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c00025fbf8 items=0 ppid=1988 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:07.820000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339366232393030623364383037306534633330323665356463646637 May 17 00:40:07.855000 audit: BPF prog-id=80 op=UNLOAD May 17 00:40:07.855000 audit: BPF prog-id=79 op=UNLOAD May 17 00:40:07.855000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:07.855000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:07.855000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:07.855000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:07.855000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:07.855000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:07.855000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:07.855000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:07.855000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:07.855000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:07.855000 audit: BPF prog-id=81 op=LOAD May 17 00:40:07.855000 audit[2547]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c00025fc88 items=0 ppid=1988 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:07.855000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339366232393030623364383037306534633330323665356463646637 May 17 00:40:07.948515 env[1411]: time="2025-05-17T00:40:07.948460095Z" level=info msg="StartContainer for \"c96b2900b3d8070e4c3026e5dcdf7e1c6fd309f4a5671a7704edd4e65939a264\" returns successfully" May 17 00:40:08.229818 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 17 00:40:08.230019 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 17 00:40:08.932121 kubelet[1859]: E0517 00:40:08.932051 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:09.524000 audit[2685]: AVC avc: denied { write } for pid=2685 comm="tee" name="fd" dev="proc" ino=23785 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:40:09.527000 audit[2687]: AVC avc: denied { write } for pid=2687 comm="tee" name="fd" dev="proc" ino=23152 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:40:09.524000 audit[2685]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcabba97de a2=241 a3=1b6 items=1 ppid=2654 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:09.524000 audit: CWD cwd="/etc/service/enabled/cni/log" May 17 00:40:09.524000 audit: PATH item=0 name="/dev/fd/63" inode=23776 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:09.524000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:40:09.529000 audit[2689]: AVC avc: denied { write } for pid=2689 comm="tee" name="fd" dev="proc" ino=23155 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:40:09.529000 audit[2696]: AVC avc: denied { write } for pid=2696 comm="tee" name="fd" dev="proc" ino=23789 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:40:09.531000 audit[2698]: AVC avc: denied { write } for pid=2698 comm="tee" name="fd" dev="proc" ino=23792 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:40:09.529000 audit[2689]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffec97367dd a2=241 a3=1b6 items=1 ppid=2657 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:09.529000 audit: CWD cwd="/etc/service/enabled/bird/log" May 17 00:40:09.529000 audit: PATH item=0 name="/dev/fd/63" inode=23148 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:09.529000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:40:09.529000 audit[2696]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffb08097cd a2=241 a3=1b6 items=1 ppid=2659 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:09.529000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 17 00:40:09.529000 audit: PATH item=0 name="/dev/fd/63" inode=23782 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:09.529000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:40:09.527000 audit[2687]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff9fd507cc a2=241 a3=1b6 items=1 ppid=2663 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:09.527000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 17 00:40:09.527000 audit: PATH item=0 name="/dev/fd/63" inode=23779 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:09.527000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:40:09.531000 audit[2698]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd7c9167dc a2=241 a3=1b6 items=1 ppid=2662 pid=2698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:09.531000 audit: CWD cwd="/etc/service/enabled/confd/log" May 17 00:40:09.531000 audit: PATH item=0 name="/dev/fd/63" inode=23149 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:09.531000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:40:09.543000 audit[2720]: AVC avc: denied { write } for pid=2720 comm="tee" name="fd" dev="proc" ino=23167 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:40:09.547000 audit[2718]: AVC avc: denied { write } for pid=2718 comm="tee" name="fd" dev="proc" ino=23801 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:40:09.547000 audit[2718]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffb6c677dc a2=241 a3=1b6 items=1 ppid=2665 pid=2718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:09.547000 audit: CWD cwd="/etc/service/enabled/felix/log" May 17 00:40:09.547000 audit: PATH item=0 name="/dev/fd/63" inode=23793 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:09.547000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:40:09.543000 audit[2720]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffefbadd7dc a2=241 a3=1b6 items=1 ppid=2671 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:09.543000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 17 00:40:09.543000 audit: PATH item=0 name="/dev/fd/63" inode=23161 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:09.543000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:40:09.821000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.821000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.821000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.821000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.821000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.821000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.821000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.821000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.821000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.821000 audit: BPF prog-id=82 op=LOAD May 17 00:40:09.821000 audit[2759]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe970cc850 a2=98 a3=3 items=0 ppid=2668 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:09.821000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:40:09.821000 audit: BPF prog-id=82 op=UNLOAD May 17 00:40:09.822000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.822000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.822000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.822000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.822000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.822000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.822000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.822000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.822000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.822000 audit: BPF prog-id=83 op=LOAD May 17 00:40:09.822000 audit[2759]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe970cc640 a2=94 a3=54428f items=0 ppid=2668 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:09.822000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:40:09.822000 audit: BPF prog-id=83 op=UNLOAD May 17 00:40:09.822000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.822000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.822000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.822000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.822000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.822000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.822000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.822000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.822000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.822000 audit: BPF prog-id=84 op=LOAD May 17 00:40:09.822000 audit[2759]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe970cc670 a2=94 a3=2 items=0 ppid=2668 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:09.822000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:40:09.823000 audit: BPF prog-id=84 op=UNLOAD May 17 00:40:09.932677 kubelet[1859]: E0517 00:40:09.932593 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:09.942000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.942000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.942000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.942000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.942000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.942000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.942000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.942000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.942000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.942000 audit: BPF prog-id=85 op=LOAD May 17 00:40:09.942000 audit[2759]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe970cc530 a2=94 a3=1 items=0 ppid=2668 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:09.942000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:40:09.942000 audit: BPF prog-id=85 op=UNLOAD May 17 00:40:09.942000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.942000 audit[2759]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe970cc600 a2=50 a3=7ffe970cc6e0 items=0 ppid=2668 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:09.942000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:40:09.952000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.952000 audit[2759]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe970cc540 a2=28 a3=0 items=0 ppid=2668 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:09.952000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:40:09.952000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.952000 audit[2759]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe970cc570 a2=28 a3=0 items=0 ppid=2668 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:09.952000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:40:09.952000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.952000 audit[2759]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe970cc480 a2=28 a3=0 items=0 ppid=2668 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:09.952000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:40:09.952000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.952000 audit[2759]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe970cc590 a2=28 a3=0 items=0 ppid=2668 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:09.952000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:40:09.952000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.952000 audit[2759]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe970cc570 a2=28 a3=0 items=0 ppid=2668 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:09.952000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:40:09.952000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.952000 audit[2759]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe970cc560 a2=28 a3=0 items=0 ppid=2668 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:09.952000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:40:09.952000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.952000 audit[2759]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe970cc590 a2=28 a3=0 items=0 ppid=2668 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:09.952000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:40:09.952000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.952000 audit[2759]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe970cc570 a2=28 a3=0 items=0 ppid=2668 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:09.952000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:40:09.952000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.952000 audit[2759]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe970cc590 a2=28 a3=0 items=0 ppid=2668 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:09.952000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:40:09.952000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.952000 audit[2759]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe970cc560 a2=28 a3=0 items=0 ppid=2668 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:09.952000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:40:09.952000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.952000 audit[2759]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe970cc5d0 a2=28 a3=0 items=0 ppid=2668 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:09.952000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:40:09.953000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.953000 audit[2759]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe970cc380 a2=50 a3=1 items=0 ppid=2668 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:09.953000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:40:09.953000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.953000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.953000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.953000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.953000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.953000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.953000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.953000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.953000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.953000 audit: BPF prog-id=86 op=LOAD May 17 00:40:09.953000 audit[2759]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe970cc380 a2=94 a3=5 items=0 ppid=2668 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:09.953000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:40:09.953000 audit: BPF prog-id=86 op=UNLOAD May 17 00:40:09.953000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.953000 audit[2759]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe970cc430 a2=50 a3=1 items=0 ppid=2668 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:09.953000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:40:09.953000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.953000 audit[2759]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe970cc550 a2=4 a3=38 items=0 ppid=2668 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:09.953000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:40:09.953000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.953000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.953000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.953000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.953000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.953000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.953000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.953000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.953000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.953000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.953000 audit[2759]: AVC avc: denied { confidentiality } for pid=2759 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:40:09.953000 audit[2759]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe970cc5a0 a2=94 a3=6 items=0 ppid=2668 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:09.953000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:40:09.953000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.953000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.953000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.953000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.953000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.953000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.953000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.953000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.953000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.953000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.953000 audit[2759]: AVC avc: denied { confidentiality } for pid=2759 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:40:09.953000 audit[2759]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe970cbd50 a2=94 a3=88 items=0 ppid=2668 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:09.953000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:40:09.953000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.953000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.953000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.953000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.953000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.953000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.953000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.953000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.953000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.953000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.953000 audit[2759]: AVC avc: denied { confidentiality } for pid=2759 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:40:09.953000 audit[2759]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe970cbd50 a2=94 a3=88 items=0 ppid=2668 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:09.953000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:40:09.964000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.964000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.964000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.964000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.964000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.964000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.964000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.964000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.964000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.964000 audit: BPF prog-id=87 op=LOAD May 17 00:40:09.964000 audit[2762]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdb3e24ac0 a2=98 a3=1999999999999999 items=0 ppid=2668 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:09.964000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:40:09.964000 audit: BPF prog-id=87 op=UNLOAD May 17 00:40:09.964000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.964000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.964000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.964000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.964000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.964000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.964000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.964000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.964000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.964000 audit: BPF prog-id=88 op=LOAD May 17 00:40:09.964000 audit[2762]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdb3e249a0 a2=94 a3=ffff items=0 ppid=2668 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:09.964000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:40:09.964000 audit: BPF prog-id=88 op=UNLOAD May 17 00:40:09.964000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.964000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.964000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.964000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.964000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.964000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.964000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.964000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.964000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:09.964000 audit: BPF prog-id=89 op=LOAD May 17 00:40:09.964000 audit[2762]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdb3e249e0 a2=94 a3=7ffdb3e24bc0 items=0 ppid=2668 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:09.964000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:40:09.965000 audit: BPF prog-id=89 op=UNLOAD May 17 00:40:10.073911 systemd-networkd[1562]: vxlan.calico: Link UP May 17 00:40:10.073923 systemd-networkd[1562]: vxlan.calico: Gained carrier May 17 00:40:10.130000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.130000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.130000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.130000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.130000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.130000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.130000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.130000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.130000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.130000 audit: BPF prog-id=90 op=LOAD May 17 00:40:10.130000 audit[2788]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffff4138100 a2=98 a3=0 items=0 ppid=2668 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:10.130000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:40:10.130000 audit: BPF prog-id=90 op=UNLOAD May 17 00:40:10.130000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.130000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.130000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.130000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.130000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.130000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.130000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.130000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.130000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.130000 audit: BPF prog-id=91 op=LOAD May 17 00:40:10.130000 audit[2788]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffff4137f10 a2=94 a3=54428f items=0 ppid=2668 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:10.130000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:40:10.130000 audit: BPF prog-id=91 op=UNLOAD May 17 00:40:10.130000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.130000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.130000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.130000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.130000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.130000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.130000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.130000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.130000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.130000 audit: BPF prog-id=92 op=LOAD May 17 00:40:10.130000 audit[2788]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffff4137f40 a2=94 a3=2 items=0 ppid=2668 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:10.130000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:40:10.130000 audit: BPF prog-id=92 op=UNLOAD May 17 00:40:10.130000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.130000 audit[2788]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffff4137e10 a2=28 a3=0 items=0 ppid=2668 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:10.130000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:40:10.130000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.130000 audit[2788]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffff4137e40 a2=28 a3=0 items=0 ppid=2668 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:10.130000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:40:10.130000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.130000 audit[2788]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffff4137d50 a2=28 a3=0 items=0 ppid=2668 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:10.130000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:40:10.130000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.130000 audit[2788]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffff4137e60 a2=28 a3=0 items=0 ppid=2668 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:10.130000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:40:10.130000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.130000 audit[2788]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffff4137e40 a2=28 a3=0 items=0 ppid=2668 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:10.130000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:40:10.130000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.130000 audit[2788]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffff4137e30 a2=28 a3=0 items=0 ppid=2668 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:10.130000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:40:10.130000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.130000 audit[2788]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffff4137e60 a2=28 a3=0 items=0 ppid=2668 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:10.130000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:40:10.130000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.130000 audit[2788]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffff4137e40 a2=28 a3=0 items=0 ppid=2668 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:10.130000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:40:10.130000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.130000 audit[2788]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffff4137e60 a2=28 a3=0 items=0 ppid=2668 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:10.130000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:40:10.130000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.130000 audit[2788]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffff4137e30 a2=28 a3=0 items=0 ppid=2668 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:10.130000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:40:10.131000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.131000 audit[2788]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffff4137ea0 a2=28 a3=0 items=0 ppid=2668 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:10.131000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:40:10.131000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.131000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.131000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.131000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.131000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.131000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.131000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.131000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.131000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.131000 audit: BPF prog-id=93 op=LOAD May 17 00:40:10.131000 audit[2788]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffff4137d10 a2=94 a3=0 items=0 ppid=2668 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:10.131000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:40:10.131000 audit: BPF prog-id=93 op=UNLOAD May 17 00:40:10.131000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.131000 audit[2788]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffff4137d00 a2=50 a3=2800 items=0 ppid=2668 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:10.131000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:40:10.131000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.131000 audit[2788]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffff4137d00 a2=50 a3=2800 items=0 ppid=2668 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:10.131000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:40:10.131000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.131000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.131000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.131000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.131000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.131000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.131000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.131000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.131000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.131000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.131000 audit: BPF prog-id=94 op=LOAD May 17 00:40:10.131000 audit[2788]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffff4137520 a2=94 a3=2 items=0 ppid=2668 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:10.131000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:40:10.131000 audit: BPF prog-id=94 op=UNLOAD May 17 00:40:10.132000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.132000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.132000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.132000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.132000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.132000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.132000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.132000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.132000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.132000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.132000 audit: BPF prog-id=95 op=LOAD May 17 00:40:10.132000 audit[2788]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffff4137620 a2=94 a3=30 items=0 ppid=2668 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:10.132000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:40:10.142000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.142000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.142000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.142000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.142000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.142000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.142000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.142000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.142000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.142000 audit: BPF prog-id=96 op=LOAD May 17 00:40:10.142000 audit[2792]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc0be235f0 a2=98 a3=0 items=0 ppid=2668 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:10.142000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:40:10.142000 audit: BPF prog-id=96 op=UNLOAD May 17 00:40:10.142000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.142000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.142000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.142000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.142000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.142000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.142000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.142000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.142000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.142000 audit: BPF prog-id=97 op=LOAD May 17 00:40:10.142000 audit[2792]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc0be233e0 a2=94 a3=54428f items=0 ppid=2668 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:10.142000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:40:10.142000 audit: BPF prog-id=97 op=UNLOAD May 17 00:40:10.142000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.142000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.142000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.142000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.142000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.142000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.142000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.142000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.142000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.142000 audit: BPF prog-id=98 op=LOAD May 17 00:40:10.142000 audit[2792]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc0be23410 a2=94 a3=2 items=0 ppid=2668 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:10.142000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:40:10.142000 audit: BPF prog-id=98 op=UNLOAD May 17 00:40:10.271000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.271000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.271000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.271000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.271000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.271000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.271000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.271000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.271000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.271000 audit: BPF prog-id=99 op=LOAD May 17 00:40:10.271000 audit[2792]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc0be232d0 a2=94 a3=1 items=0 ppid=2668 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:10.271000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:40:10.271000 audit: BPF prog-id=99 op=UNLOAD May 17 00:40:10.271000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.271000 audit[2792]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc0be233a0 a2=50 a3=7ffc0be23480 items=0 ppid=2668 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:10.271000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:40:10.281000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.281000 audit[2792]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc0be232e0 a2=28 a3=0 items=0 ppid=2668 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:10.281000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:40:10.281000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.281000 audit[2792]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc0be23310 a2=28 a3=0 items=0 ppid=2668 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:10.281000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:40:10.281000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.281000 audit[2792]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc0be23220 a2=28 a3=0 items=0 ppid=2668 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:10.281000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:40:10.281000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.281000 audit[2792]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc0be23330 a2=28 a3=0 items=0 ppid=2668 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:10.281000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:40:10.281000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.281000 audit[2792]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc0be23310 a2=28 a3=0 items=0 ppid=2668 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:10.281000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:40:10.281000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.281000 audit[2792]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc0be23300 a2=28 a3=0 items=0 ppid=2668 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:10.281000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:40:10.281000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.281000 audit[2792]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc0be23330 a2=28 a3=0 items=0 ppid=2668 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:10.281000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:40:10.281000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.281000 audit[2792]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc0be23310 a2=28 a3=0 items=0 ppid=2668 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:10.281000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:40:10.281000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.281000 audit[2792]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc0be23330 a2=28 a3=0 items=0 ppid=2668 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:10.281000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:40:10.281000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.281000 audit[2792]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc0be23300 a2=28 a3=0 items=0 ppid=2668 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:10.281000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:40:10.281000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.281000 audit[2792]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc0be23370 a2=28 a3=0 items=0 ppid=2668 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:10.281000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:40:10.281000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.281000 audit[2792]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc0be23120 a2=50 a3=1 items=0 ppid=2668 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:10.281000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:40:10.281000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.281000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.281000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.281000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.281000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.281000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.281000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.281000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.281000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.281000 audit: BPF prog-id=100 op=LOAD May 17 00:40:10.281000 audit[2792]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc0be23120 a2=94 a3=5 items=0 ppid=2668 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:10.281000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:40:10.282000 audit: BPF prog-id=100 op=UNLOAD May 17 00:40:10.282000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.282000 audit[2792]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc0be231d0 a2=50 a3=1 items=0 ppid=2668 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:10.282000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:40:10.282000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.282000 audit[2792]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc0be232f0 a2=4 a3=38 items=0 ppid=2668 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:10.282000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:40:10.282000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.282000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.282000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.282000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.282000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.282000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.282000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.282000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.282000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.282000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.282000 audit[2792]: AVC avc: denied { confidentiality } for pid=2792 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:40:10.282000 audit[2792]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc0be23340 a2=94 a3=6 items=0 ppid=2668 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:10.282000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:40:10.282000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.282000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.282000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.282000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.282000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.282000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.282000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.282000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.282000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.282000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.282000 audit[2792]: AVC avc: denied { confidentiality } for pid=2792 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:40:10.282000 audit[2792]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc0be22af0 a2=94 a3=88 items=0 ppid=2668 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:10.282000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:40:10.282000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.282000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.282000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.282000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.282000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.282000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.282000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.282000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.282000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.282000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.282000 audit[2792]: AVC avc: denied { confidentiality } for pid=2792 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:40:10.282000 audit[2792]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc0be22af0 a2=94 a3=88 items=0 ppid=2668 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:10.282000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:40:10.283000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.283000 audit[2792]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc0be24520 a2=10 a3=f8f00800 items=0 ppid=2668 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:10.283000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:40:10.283000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.283000 audit[2792]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc0be243c0 a2=10 a3=3 items=0 ppid=2668 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:10.283000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:40:10.283000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.283000 audit[2792]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc0be24360 a2=10 a3=3 items=0 ppid=2668 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:10.283000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:40:10.283000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:10.283000 audit[2792]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc0be24360 a2=10 a3=7 items=0 ppid=2668 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:10.283000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:40:10.291000 audit: BPF prog-id=95 op=UNLOAD May 17 00:40:10.443000 audit[2817]: NETFILTER_CFG table=mangle:68 family=2 entries=16 op=nft_register_chain pid=2817 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:40:10.443000 audit[2817]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffe546fa6f0 a2=0 a3=7ffe546fa6dc items=0 ppid=2668 pid=2817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:10.443000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:40:10.475000 audit[2816]: NETFILTER_CFG table=nat:69 family=2 entries=15 op=nft_register_chain pid=2816 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:40:10.475000 audit[2816]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffe636c7300 a2=0 a3=7ffe636c72ec items=0 ppid=2668 pid=2816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:10.475000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:40:10.475000 audit[2819]: NETFILTER_CFG table=filter:70 family=2 entries=39 op=nft_register_chain pid=2819 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:40:10.475000 audit[2819]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffcdf3c1950 a2=0 a3=7ffcdf3c193c items=0 ppid=2668 pid=2819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:10.475000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:40:10.480000 audit[2815]: NETFILTER_CFG table=raw:71 family=2 entries=21 op=nft_register_chain pid=2815 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:40:10.480000 audit[2815]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7fffcf8612f0 a2=0 a3=7fffcf8612dc items=0 ppid=2668 pid=2815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:10.480000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:40:10.933267 kubelet[1859]: E0517 00:40:10.933197 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:11.837867 systemd-networkd[1562]: vxlan.calico: Gained IPv6LL May 17 00:40:11.934031 kubelet[1859]: E0517 00:40:11.933968 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:12.935161 kubelet[1859]: E0517 00:40:12.935102 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:13.009204 env[1411]: time="2025-05-17T00:40:13.009108238Z" level=info msg="StopPodSandbox for \"d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e\"" May 17 00:40:13.062977 kubelet[1859]: I0517 00:40:13.062909 1859 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-lzzdk" podStartSLOduration=10.815794684 podStartE2EDuration="32.06288286s" podCreationTimestamp="2025-05-17 00:39:41 +0000 UTC" firstStartedPulling="2025-05-17 00:39:46.462713186 +0000 UTC m=+6.679055776" lastFinishedPulling="2025-05-17 00:40:07.709801262 +0000 UTC m=+27.926143952" observedRunningTime="2025-05-17 00:40:08.101590435 +0000 UTC m=+28.317933125" watchObservedRunningTime="2025-05-17 00:40:13.06288286 +0000 UTC m=+33.279225450" May 17 00:40:13.094811 env[1411]: 2025-05-17 00:40:13.062 [INFO][2841] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e" May 17 00:40:13.094811 env[1411]: 2025-05-17 00:40:13.063 [INFO][2841] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e" iface="eth0" netns="/var/run/netns/cni-8af34489-eebe-c839-02ec-9bd1ec8e85fb" May 17 00:40:13.094811 env[1411]: 2025-05-17 00:40:13.063 [INFO][2841] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e" iface="eth0" netns="/var/run/netns/cni-8af34489-eebe-c839-02ec-9bd1ec8e85fb" May 17 00:40:13.094811 env[1411]: 2025-05-17 00:40:13.063 [INFO][2841] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e" iface="eth0" netns="/var/run/netns/cni-8af34489-eebe-c839-02ec-9bd1ec8e85fb" May 17 00:40:13.094811 env[1411]: 2025-05-17 00:40:13.063 [INFO][2841] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e" May 17 00:40:13.094811 env[1411]: 2025-05-17 00:40:13.063 [INFO][2841] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e" May 17 00:40:13.094811 env[1411]: 2025-05-17 00:40:13.082 [INFO][2848] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e" HandleID="k8s-pod-network.d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e" Workload="10.200.4.18-k8s-csi--node--driver--nt72n-eth0" May 17 00:40:13.094811 env[1411]: 2025-05-17 00:40:13.082 [INFO][2848] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:40:13.094811 env[1411]: 2025-05-17 00:40:13.082 [INFO][2848] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:40:13.094811 env[1411]: 2025-05-17 00:40:13.089 [WARNING][2848] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e" HandleID="k8s-pod-network.d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e" Workload="10.200.4.18-k8s-csi--node--driver--nt72n-eth0" May 17 00:40:13.094811 env[1411]: 2025-05-17 00:40:13.089 [INFO][2848] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e" HandleID="k8s-pod-network.d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e" Workload="10.200.4.18-k8s-csi--node--driver--nt72n-eth0" May 17 00:40:13.094811 env[1411]: 2025-05-17 00:40:13.091 [INFO][2848] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:40:13.094811 env[1411]: 2025-05-17 00:40:13.093 [INFO][2841] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e" May 17 00:40:13.097417 systemd[1]: run-netns-cni\x2d8af34489\x2deebe\x2dc839\x2d02ec\x2d9bd1ec8e85fb.mount: Deactivated successfully. May 17 00:40:13.099232 env[1411]: time="2025-05-17T00:40:13.099193354Z" level=info msg="TearDown network for sandbox \"d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e\" successfully" May 17 00:40:13.099333 env[1411]: time="2025-05-17T00:40:13.099232058Z" level=info msg="StopPodSandbox for \"d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e\" returns successfully" May 17 00:40:13.100166 env[1411]: time="2025-05-17T00:40:13.100133847Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-nt72n,Uid:5c6f2d45-a691-4f43-862c-1793e0fd6dbb,Namespace:calico-system,Attempt:1,}" May 17 00:40:13.264143 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:40:13.264274 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4f3fa026604: link becomes ready May 17 00:40:13.261657 systemd-networkd[1562]: cali4f3fa026604: Link UP May 17 00:40:13.264841 systemd-networkd[1562]: cali4f3fa026604: Gained carrier May 17 00:40:13.281143 env[1411]: 2025-05-17 00:40:13.197 [INFO][2855] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.4.18-k8s-csi--node--driver--nt72n-eth0 csi-node-driver- calico-system 5c6f2d45-a691-4f43-862c-1793e0fd6dbb 1605 0 2025-05-17 00:39:41 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:78f6f74485 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.200.4.18 csi-node-driver-nt72n eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali4f3fa026604 [] [] }} ContainerID="d0a21a9dab935f68a6542fe2a322644e8c53862ba482787fc312d5dfa969a953" Namespace="calico-system" Pod="csi-node-driver-nt72n" WorkloadEndpoint="10.200.4.18-k8s-csi--node--driver--nt72n-" May 17 00:40:13.281143 env[1411]: 2025-05-17 00:40:13.197 [INFO][2855] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="d0a21a9dab935f68a6542fe2a322644e8c53862ba482787fc312d5dfa969a953" Namespace="calico-system" Pod="csi-node-driver-nt72n" WorkloadEndpoint="10.200.4.18-k8s-csi--node--driver--nt72n-eth0" May 17 00:40:13.281143 env[1411]: 2025-05-17 00:40:13.219 [INFO][2866] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d0a21a9dab935f68a6542fe2a322644e8c53862ba482787fc312d5dfa969a953" HandleID="k8s-pod-network.d0a21a9dab935f68a6542fe2a322644e8c53862ba482787fc312d5dfa969a953" Workload="10.200.4.18-k8s-csi--node--driver--nt72n-eth0" May 17 00:40:13.281143 env[1411]: 2025-05-17 00:40:13.219 [INFO][2866] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d0a21a9dab935f68a6542fe2a322644e8c53862ba482787fc312d5dfa969a953" HandleID="k8s-pod-network.d0a21a9dab935f68a6542fe2a322644e8c53862ba482787fc312d5dfa969a953" Workload="10.200.4.18-k8s-csi--node--driver--nt72n-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002c7020), Attrs:map[string]string{"namespace":"calico-system", "node":"10.200.4.18", "pod":"csi-node-driver-nt72n", "timestamp":"2025-05-17 00:40:13.219469459 +0000 UTC"}, Hostname:"10.200.4.18", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:40:13.281143 env[1411]: 2025-05-17 00:40:13.220 [INFO][2866] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:40:13.281143 env[1411]: 2025-05-17 00:40:13.220 [INFO][2866] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:40:13.281143 env[1411]: 2025-05-17 00:40:13.220 [INFO][2866] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.4.18' May 17 00:40:13.281143 env[1411]: 2025-05-17 00:40:13.226 [INFO][2866] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.d0a21a9dab935f68a6542fe2a322644e8c53862ba482787fc312d5dfa969a953" host="10.200.4.18" May 17 00:40:13.281143 env[1411]: 2025-05-17 00:40:13.230 [INFO][2866] ipam/ipam.go 394: Looking up existing affinities for host host="10.200.4.18" May 17 00:40:13.281143 env[1411]: 2025-05-17 00:40:13.234 [INFO][2866] ipam/ipam.go 511: Trying affinity for 192.168.76.64/26 host="10.200.4.18" May 17 00:40:13.281143 env[1411]: 2025-05-17 00:40:13.236 [INFO][2866] ipam/ipam.go 158: Attempting to load block cidr=192.168.76.64/26 host="10.200.4.18" May 17 00:40:13.281143 env[1411]: 2025-05-17 00:40:13.238 [INFO][2866] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.76.64/26 host="10.200.4.18" May 17 00:40:13.281143 env[1411]: 2025-05-17 00:40:13.238 [INFO][2866] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.76.64/26 handle="k8s-pod-network.d0a21a9dab935f68a6542fe2a322644e8c53862ba482787fc312d5dfa969a953" host="10.200.4.18" May 17 00:40:13.281143 env[1411]: 2025-05-17 00:40:13.239 [INFO][2866] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.d0a21a9dab935f68a6542fe2a322644e8c53862ba482787fc312d5dfa969a953 May 17 00:40:13.281143 env[1411]: 2025-05-17 00:40:13.243 [INFO][2866] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.76.64/26 handle="k8s-pod-network.d0a21a9dab935f68a6542fe2a322644e8c53862ba482787fc312d5dfa969a953" host="10.200.4.18" May 17 00:40:13.281143 env[1411]: 2025-05-17 00:40:13.250 [INFO][2866] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.76.65/26] block=192.168.76.64/26 handle="k8s-pod-network.d0a21a9dab935f68a6542fe2a322644e8c53862ba482787fc312d5dfa969a953" host="10.200.4.18" May 17 00:40:13.281143 env[1411]: 2025-05-17 00:40:13.250 [INFO][2866] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.76.65/26] handle="k8s-pod-network.d0a21a9dab935f68a6542fe2a322644e8c53862ba482787fc312d5dfa969a953" host="10.200.4.18" May 17 00:40:13.281143 env[1411]: 2025-05-17 00:40:13.250 [INFO][2866] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:40:13.281143 env[1411]: 2025-05-17 00:40:13.250 [INFO][2866] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.76.65/26] IPv6=[] ContainerID="d0a21a9dab935f68a6542fe2a322644e8c53862ba482787fc312d5dfa969a953" HandleID="k8s-pod-network.d0a21a9dab935f68a6542fe2a322644e8c53862ba482787fc312d5dfa969a953" Workload="10.200.4.18-k8s-csi--node--driver--nt72n-eth0" May 17 00:40:13.282103 env[1411]: 2025-05-17 00:40:13.251 [INFO][2855] cni-plugin/k8s.go 418: Populated endpoint ContainerID="d0a21a9dab935f68a6542fe2a322644e8c53862ba482787fc312d5dfa969a953" Namespace="calico-system" Pod="csi-node-driver-nt72n" WorkloadEndpoint="10.200.4.18-k8s-csi--node--driver--nt72n-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.18-k8s-csi--node--driver--nt72n-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5c6f2d45-a691-4f43-862c-1793e0fd6dbb", ResourceVersion:"1605", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 39, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.18", ContainerID:"", Pod:"csi-node-driver-nt72n", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.76.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali4f3fa026604", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:40:13.282103 env[1411]: 2025-05-17 00:40:13.252 [INFO][2855] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.76.65/32] ContainerID="d0a21a9dab935f68a6542fe2a322644e8c53862ba482787fc312d5dfa969a953" Namespace="calico-system" Pod="csi-node-driver-nt72n" WorkloadEndpoint="10.200.4.18-k8s-csi--node--driver--nt72n-eth0" May 17 00:40:13.282103 env[1411]: 2025-05-17 00:40:13.252 [INFO][2855] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali4f3fa026604 ContainerID="d0a21a9dab935f68a6542fe2a322644e8c53862ba482787fc312d5dfa969a953" Namespace="calico-system" Pod="csi-node-driver-nt72n" WorkloadEndpoint="10.200.4.18-k8s-csi--node--driver--nt72n-eth0" May 17 00:40:13.282103 env[1411]: 2025-05-17 00:40:13.265 [INFO][2855] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d0a21a9dab935f68a6542fe2a322644e8c53862ba482787fc312d5dfa969a953" Namespace="calico-system" Pod="csi-node-driver-nt72n" WorkloadEndpoint="10.200.4.18-k8s-csi--node--driver--nt72n-eth0" May 17 00:40:13.282103 env[1411]: 2025-05-17 00:40:13.266 [INFO][2855] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="d0a21a9dab935f68a6542fe2a322644e8c53862ba482787fc312d5dfa969a953" Namespace="calico-system" Pod="csi-node-driver-nt72n" WorkloadEndpoint="10.200.4.18-k8s-csi--node--driver--nt72n-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.18-k8s-csi--node--driver--nt72n-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5c6f2d45-a691-4f43-862c-1793e0fd6dbb", ResourceVersion:"1605", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 39, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.18", ContainerID:"d0a21a9dab935f68a6542fe2a322644e8c53862ba482787fc312d5dfa969a953", Pod:"csi-node-driver-nt72n", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.76.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali4f3fa026604", MAC:"7e:d6:5b:d2:d2:29", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:40:13.282103 env[1411]: 2025-05-17 00:40:13.277 [INFO][2855] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="d0a21a9dab935f68a6542fe2a322644e8c53862ba482787fc312d5dfa969a953" Namespace="calico-system" Pod="csi-node-driver-nt72n" WorkloadEndpoint="10.200.4.18-k8s-csi--node--driver--nt72n-eth0" May 17 00:40:13.300943 env[1411]: time="2025-05-17T00:40:13.300728102Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:40:13.300943 env[1411]: time="2025-05-17T00:40:13.300774907Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:40:13.300943 env[1411]: time="2025-05-17T00:40:13.300790408Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:40:13.301208 env[1411]: time="2025-05-17T00:40:13.300984527Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d0a21a9dab935f68a6542fe2a322644e8c53862ba482787fc312d5dfa969a953 pid=2892 runtime=io.containerd.runc.v2 May 17 00:40:13.323527 systemd[1]: Started cri-containerd-d0a21a9dab935f68a6542fe2a322644e8c53862ba482787fc312d5dfa969a953.scope. May 17 00:40:13.349354 kernel: kauditd_printk_skb: 548 callbacks suppressed May 17 00:40:13.349620 kernel: audit: type=1400 audit(1747442413.332:646): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:13.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:13.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:13.375814 kernel: audit: type=1400 audit(1747442413.332:647): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:13.375951 kernel: audit: type=1400 audit(1747442413.332:648): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:13.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:13.388742 kernel: audit: type=1400 audit(1747442413.332:649): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:13.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:13.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:13.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:13.412792 kernel: audit: type=1400 audit(1747442413.332:650): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:13.412930 kernel: audit: type=1400 audit(1747442413.332:651): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:13.412955 kernel: audit: type=1400 audit(1747442413.332:652): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:13.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:13.426983 env[1411]: time="2025-05-17T00:40:13.426690070Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-nt72n,Uid:5c6f2d45-a691-4f43-862c-1793e0fd6dbb,Namespace:calico-system,Attempt:1,} returns sandbox id \"d0a21a9dab935f68a6542fe2a322644e8c53862ba482787fc312d5dfa969a953\"" May 17 00:40:13.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:13.429778 env[1411]: time="2025-05-17T00:40:13.428631062Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\"" May 17 00:40:13.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:13.449765 kernel: audit: type=1400 audit(1747442413.332:653): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:13.449878 kernel: audit: type=1400 audit(1747442413.332:654): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:13.449917 kernel: audit: type=1400 audit(1747442413.349:655): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:13.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:13.349000 audit: BPF prog-id=101 op=LOAD May 17 00:40:13.296000 audit[2881]: NETFILTER_CFG table=filter:72 family=2 entries=38 op=nft_register_chain pid=2881 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:40:13.296000 audit[2881]: SYSCALL arch=c000003e syscall=46 success=yes exit=21364 a0=3 a1=7ffe4db02a80 a2=0 a3=7ffe4db02a6c items=0 ppid=2668 pid=2881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:13.296000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:40:13.350000 audit[2901]: AVC avc: denied { bpf } for pid=2901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:13.350000 audit[2901]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2892 pid=2901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:13.350000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430613231613964616239333566363861363534326665326133323236 May 17 00:40:13.350000 audit[2901]: AVC avc: denied { perfmon } for pid=2901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:13.350000 audit[2901]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2892 pid=2901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:13.350000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430613231613964616239333566363861363534326665326133323236 May 17 00:40:13.350000 audit[2901]: AVC avc: denied { bpf } for pid=2901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:13.350000 audit[2901]: AVC avc: denied { bpf } for pid=2901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:13.350000 audit[2901]: AVC avc: denied { bpf } for pid=2901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:13.350000 audit[2901]: AVC avc: denied { perfmon } for pid=2901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:13.350000 audit[2901]: AVC avc: denied { perfmon } for pid=2901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:13.350000 audit[2901]: AVC avc: denied { perfmon } for pid=2901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:13.350000 audit[2901]: AVC avc: denied { perfmon } for pid=2901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:13.350000 audit[2901]: AVC avc: denied { perfmon } for pid=2901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:13.350000 audit[2901]: AVC avc: denied { bpf } for pid=2901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:13.350000 audit[2901]: AVC avc: denied { bpf } for pid=2901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:13.350000 audit: BPF prog-id=102 op=LOAD May 17 00:40:13.350000 audit[2901]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024aa0 items=0 ppid=2892 pid=2901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:13.350000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430613231613964616239333566363861363534326665326133323236 May 17 00:40:13.375000 audit[2901]: AVC avc: denied { bpf } for pid=2901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:13.375000 audit[2901]: AVC avc: denied { bpf } for pid=2901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:13.375000 audit[2901]: AVC avc: denied { perfmon } for pid=2901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:13.375000 audit[2901]: AVC avc: denied { perfmon } for pid=2901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:13.375000 audit[2901]: AVC avc: denied { perfmon } for pid=2901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:13.375000 audit[2901]: AVC avc: denied { perfmon } for pid=2901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:13.375000 audit[2901]: AVC avc: denied { perfmon } for pid=2901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:13.375000 audit[2901]: AVC avc: denied { bpf } for pid=2901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:13.375000 audit[2901]: AVC avc: denied { bpf } for pid=2901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:13.375000 audit: BPF prog-id=103 op=LOAD May 17 00:40:13.375000 audit[2901]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000024ae8 items=0 ppid=2892 pid=2901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:13.375000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430613231613964616239333566363861363534326665326133323236 May 17 00:40:13.375000 audit: BPF prog-id=103 op=UNLOAD May 17 00:40:13.375000 audit: BPF prog-id=102 op=UNLOAD May 17 00:40:13.375000 audit[2901]: AVC avc: denied { bpf } for pid=2901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:13.375000 audit[2901]: AVC avc: denied { bpf } for pid=2901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:13.375000 audit[2901]: AVC avc: denied { bpf } for pid=2901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:13.375000 audit[2901]: AVC avc: denied { perfmon } for pid=2901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:13.375000 audit[2901]: AVC avc: denied { perfmon } for pid=2901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:13.375000 audit[2901]: AVC avc: denied { perfmon } for pid=2901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:13.375000 audit[2901]: AVC avc: denied { perfmon } for pid=2901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:13.375000 audit[2901]: AVC avc: denied { perfmon } for pid=2901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:13.375000 audit[2901]: AVC avc: denied { bpf } for pid=2901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:13.375000 audit[2901]: AVC avc: denied { bpf } for pid=2901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:13.375000 audit: BPF prog-id=104 op=LOAD May 17 00:40:13.375000 audit[2901]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000024ef8 items=0 ppid=2892 pid=2901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:13.375000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430613231613964616239333566363861363534326665326133323236 May 17 00:40:13.936286 kubelet[1859]: E0517 00:40:13.936216 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:14.462067 systemd-networkd[1562]: cali4f3fa026604: Gained IPv6LL May 17 00:40:14.937313 kubelet[1859]: E0517 00:40:14.937230 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:15.096029 env[1411]: time="2025-05-17T00:40:15.095975677Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:15.102616 env[1411]: time="2025-05-17T00:40:15.102560595Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d5b08093b7928c0ac1122e59edf69b2e58c6d10ecc8b9e5cffeb809a956dc48e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:15.108238 env[1411]: time="2025-05-17T00:40:15.108197824Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:15.114972 env[1411]: time="2025-05-17T00:40:15.114934556Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:27883a4104876fe239311dd93ce6efd0c4a87de7163d57a4c8d96bd65a287ffd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:15.115392 env[1411]: time="2025-05-17T00:40:15.115354595Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\" returns image reference \"sha256:d5b08093b7928c0ac1122e59edf69b2e58c6d10ecc8b9e5cffeb809a956dc48e\"" May 17 00:40:15.118010 env[1411]: time="2025-05-17T00:40:15.117974541Z" level=info msg="CreateContainer within sandbox \"d0a21a9dab935f68a6542fe2a322644e8c53862ba482787fc312d5dfa969a953\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 17 00:40:15.162792 env[1411]: time="2025-05-17T00:40:15.162734840Z" level=info msg="CreateContainer within sandbox \"d0a21a9dab935f68a6542fe2a322644e8c53862ba482787fc312d5dfa969a953\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"c488a4044fdd877f494e5eb9825e3110c4d99d871158797605f27ebe843225fb\"" May 17 00:40:15.163465 env[1411]: time="2025-05-17T00:40:15.163430605Z" level=info msg="StartContainer for \"c488a4044fdd877f494e5eb9825e3110c4d99d871158797605f27ebe843225fb\"" May 17 00:40:15.196556 systemd[1]: run-containerd-runc-k8s.io-c488a4044fdd877f494e5eb9825e3110c4d99d871158797605f27ebe843225fb-runc.RkNFxS.mount: Deactivated successfully. May 17 00:40:15.199937 systemd[1]: Started cri-containerd-c488a4044fdd877f494e5eb9825e3110c4d99d871158797605f27ebe843225fb.scope. May 17 00:40:15.214000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:15.214000 audit[2936]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f3b9157db68 items=0 ppid=2892 pid=2936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:15.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334383861343034346664643837376634393465356562393832356533 May 17 00:40:15.214000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:15.214000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:15.214000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:15.214000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:15.214000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:15.214000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:15.214000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:15.214000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:15.214000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:15.214000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:15.214000 audit: BPF prog-id=105 op=LOAD May 17 00:40:15.214000 audit[2936]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000393228 items=0 ppid=2892 pid=2936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:15.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334383861343034346664643837376634393465356562393832356533 May 17 00:40:15.214000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:15.214000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:15.214000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:15.214000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:15.214000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:15.214000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:15.214000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:15.214000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:15.214000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:15.214000 audit: BPF prog-id=106 op=LOAD May 17 00:40:15.214000 audit[2936]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000393278 items=0 ppid=2892 pid=2936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:15.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334383861343034346664643837376634393465356562393832356533 May 17 00:40:15.214000 audit: BPF prog-id=106 op=UNLOAD May 17 00:40:15.214000 audit: BPF prog-id=105 op=UNLOAD May 17 00:40:15.214000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:15.214000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:15.214000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:15.214000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:15.214000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:15.214000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:15.214000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:15.214000 audit[2936]: AVC avc: denied { perfmon } for pid=2936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:15.214000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:15.214000 audit[2936]: AVC avc: denied { bpf } for pid=2936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:15.214000 audit: BPF prog-id=107 op=LOAD May 17 00:40:15.214000 audit[2936]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000393308 items=0 ppid=2892 pid=2936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:15.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334383861343034346664643837376634393465356562393832356533 May 17 00:40:15.235501 env[1411]: time="2025-05-17T00:40:15.235456061Z" level=info msg="StartContainer for \"c488a4044fdd877f494e5eb9825e3110c4d99d871158797605f27ebe843225fb\" returns successfully" May 17 00:40:15.236990 env[1411]: time="2025-05-17T00:40:15.236961503Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\"" May 17 00:40:15.937678 kubelet[1859]: E0517 00:40:15.937612 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:16.938770 kubelet[1859]: E0517 00:40:16.938697 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:17.009142 env[1411]: time="2025-05-17T00:40:17.009097236Z" level=info msg="StopPodSandbox for \"c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab\"" May 17 00:40:17.132701 env[1411]: 2025-05-17 00:40:17.085 [INFO][2980] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab" May 17 00:40:17.132701 env[1411]: 2025-05-17 00:40:17.086 [INFO][2980] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab" iface="eth0" netns="/var/run/netns/cni-1d70cdf2-3390-57d3-cddc-cdf4dbf63b26" May 17 00:40:17.132701 env[1411]: 2025-05-17 00:40:17.086 [INFO][2980] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab" iface="eth0" netns="/var/run/netns/cni-1d70cdf2-3390-57d3-cddc-cdf4dbf63b26" May 17 00:40:17.132701 env[1411]: 2025-05-17 00:40:17.086 [INFO][2980] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab" iface="eth0" netns="/var/run/netns/cni-1d70cdf2-3390-57d3-cddc-cdf4dbf63b26" May 17 00:40:17.132701 env[1411]: 2025-05-17 00:40:17.086 [INFO][2980] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab" May 17 00:40:17.132701 env[1411]: 2025-05-17 00:40:17.086 [INFO][2980] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab" May 17 00:40:17.132701 env[1411]: 2025-05-17 00:40:17.118 [INFO][2987] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab" HandleID="k8s-pod-network.c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab" Workload="10.200.4.18-k8s-nginx--deployment--7fcdb87857--9kkwx-eth0" May 17 00:40:17.132701 env[1411]: 2025-05-17 00:40:17.118 [INFO][2987] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:40:17.132701 env[1411]: 2025-05-17 00:40:17.118 [INFO][2987] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:40:17.132701 env[1411]: 2025-05-17 00:40:17.126 [WARNING][2987] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab" HandleID="k8s-pod-network.c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab" Workload="10.200.4.18-k8s-nginx--deployment--7fcdb87857--9kkwx-eth0" May 17 00:40:17.132701 env[1411]: 2025-05-17 00:40:17.126 [INFO][2987] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab" HandleID="k8s-pod-network.c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab" Workload="10.200.4.18-k8s-nginx--deployment--7fcdb87857--9kkwx-eth0" May 17 00:40:17.132701 env[1411]: 2025-05-17 00:40:17.129 [INFO][2987] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:40:17.132701 env[1411]: 2025-05-17 00:40:17.131 [INFO][2980] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab" May 17 00:40:17.135950 systemd[1]: run-netns-cni\x2d1d70cdf2\x2d3390\x2d57d3\x2dcddc\x2dcdf4dbf63b26.mount: Deactivated successfully. May 17 00:40:17.136530 env[1411]: time="2025-05-17T00:40:17.136480367Z" level=info msg="TearDown network for sandbox \"c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab\" successfully" May 17 00:40:17.136706 env[1411]: time="2025-05-17T00:40:17.136679784Z" level=info msg="StopPodSandbox for \"c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab\" returns successfully" May 17 00:40:17.138108 env[1411]: time="2025-05-17T00:40:17.138070208Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-9kkwx,Uid:9f88e28f-2a3c-4227-88be-aeaa28287898,Namespace:default,Attempt:1,}" May 17 00:40:17.243835 env[1411]: time="2025-05-17T00:40:17.243701904Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:17.254130 env[1411]: time="2025-05-17T00:40:17.254089428Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:45c8692ffc029387ee93ba83da8ad26da9749cf2ba6ed03981f8f9933ed5a5b0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:17.258760 env[1411]: time="2025-05-17T00:40:17.258708339Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:17.264426 env[1411]: time="2025-05-17T00:40:17.264369643Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\" returns image reference \"sha256:45c8692ffc029387ee93ba83da8ad26da9749cf2ba6ed03981f8f9933ed5a5b0\"" May 17 00:40:17.264698 env[1411]: time="2025-05-17T00:40:17.264671570Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:dca5c16181edde2e860463615523ce457cd9dcfca85b7cfdcd6f3ea7de6f2ac8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:17.268818 env[1411]: time="2025-05-17T00:40:17.268782935Z" level=info msg="CreateContainer within sandbox \"d0a21a9dab935f68a6542fe2a322644e8c53862ba482787fc312d5dfa969a953\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 17 00:40:17.324058 systemd-networkd[1562]: calia7ffd5f8aff: Link UP May 17 00:40:17.326723 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:40:17.326831 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia7ffd5f8aff: link becomes ready May 17 00:40:17.332747 systemd-networkd[1562]: calia7ffd5f8aff: Gained carrier May 17 00:40:17.338508 env[1411]: time="2025-05-17T00:40:17.338440532Z" level=info msg="CreateContainer within sandbox \"d0a21a9dab935f68a6542fe2a322644e8c53862ba482787fc312d5dfa969a953\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"038c255493f2c97c3ef914688c59e3cf6844b926d81aba63958525c688bd40d5\"" May 17 00:40:17.339734 env[1411]: time="2025-05-17T00:40:17.339699944Z" level=info msg="StartContainer for \"038c255493f2c97c3ef914688c59e3cf6844b926d81aba63958525c688bd40d5\"" May 17 00:40:17.363082 env[1411]: 2025-05-17 00:40:17.238 [INFO][2993] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.4.18-k8s-nginx--deployment--7fcdb87857--9kkwx-eth0 nginx-deployment-7fcdb87857- default 9f88e28f-2a3c-4227-88be-aeaa28287898 1624 0 2025-05-17 00:40:02 +0000 UTC map[app:nginx pod-template-hash:7fcdb87857 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.4.18 nginx-deployment-7fcdb87857-9kkwx eth0 default [] [] [kns.default ksa.default.default] calia7ffd5f8aff [] [] }} ContainerID="cb78e895e4bf99d07358472dc9154532fd60e24e9a115abd3747e8b590c43856" Namespace="default" Pod="nginx-deployment-7fcdb87857-9kkwx" WorkloadEndpoint="10.200.4.18-k8s-nginx--deployment--7fcdb87857--9kkwx-" May 17 00:40:17.363082 env[1411]: 2025-05-17 00:40:17.238 [INFO][2993] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="cb78e895e4bf99d07358472dc9154532fd60e24e9a115abd3747e8b590c43856" Namespace="default" Pod="nginx-deployment-7fcdb87857-9kkwx" WorkloadEndpoint="10.200.4.18-k8s-nginx--deployment--7fcdb87857--9kkwx-eth0" May 17 00:40:17.363082 env[1411]: 2025-05-17 00:40:17.276 [INFO][3008] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="cb78e895e4bf99d07358472dc9154532fd60e24e9a115abd3747e8b590c43856" HandleID="k8s-pod-network.cb78e895e4bf99d07358472dc9154532fd60e24e9a115abd3747e8b590c43856" Workload="10.200.4.18-k8s-nginx--deployment--7fcdb87857--9kkwx-eth0" May 17 00:40:17.363082 env[1411]: 2025-05-17 00:40:17.277 [INFO][3008] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="cb78e895e4bf99d07358472dc9154532fd60e24e9a115abd3747e8b590c43856" HandleID="k8s-pod-network.cb78e895e4bf99d07358472dc9154532fd60e24e9a115abd3747e8b590c43856" Workload="10.200.4.18-k8s-nginx--deployment--7fcdb87857--9kkwx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d3020), Attrs:map[string]string{"namespace":"default", "node":"10.200.4.18", "pod":"nginx-deployment-7fcdb87857-9kkwx", "timestamp":"2025-05-17 00:40:17.276906458 +0000 UTC"}, Hostname:"10.200.4.18", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:40:17.363082 env[1411]: 2025-05-17 00:40:17.277 [INFO][3008] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:40:17.363082 env[1411]: 2025-05-17 00:40:17.277 [INFO][3008] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:40:17.363082 env[1411]: 2025-05-17 00:40:17.277 [INFO][3008] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.4.18' May 17 00:40:17.363082 env[1411]: 2025-05-17 00:40:17.284 [INFO][3008] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.cb78e895e4bf99d07358472dc9154532fd60e24e9a115abd3747e8b590c43856" host="10.200.4.18" May 17 00:40:17.363082 env[1411]: 2025-05-17 00:40:17.288 [INFO][3008] ipam/ipam.go 394: Looking up existing affinities for host host="10.200.4.18" May 17 00:40:17.363082 env[1411]: 2025-05-17 00:40:17.292 [INFO][3008] ipam/ipam.go 511: Trying affinity for 192.168.76.64/26 host="10.200.4.18" May 17 00:40:17.363082 env[1411]: 2025-05-17 00:40:17.294 [INFO][3008] ipam/ipam.go 158: Attempting to load block cidr=192.168.76.64/26 host="10.200.4.18" May 17 00:40:17.363082 env[1411]: 2025-05-17 00:40:17.296 [INFO][3008] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.76.64/26 host="10.200.4.18" May 17 00:40:17.363082 env[1411]: 2025-05-17 00:40:17.296 [INFO][3008] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.76.64/26 handle="k8s-pod-network.cb78e895e4bf99d07358472dc9154532fd60e24e9a115abd3747e8b590c43856" host="10.200.4.18" May 17 00:40:17.363082 env[1411]: 2025-05-17 00:40:17.298 [INFO][3008] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.cb78e895e4bf99d07358472dc9154532fd60e24e9a115abd3747e8b590c43856 May 17 00:40:17.363082 env[1411]: 2025-05-17 00:40:17.302 [INFO][3008] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.76.64/26 handle="k8s-pod-network.cb78e895e4bf99d07358472dc9154532fd60e24e9a115abd3747e8b590c43856" host="10.200.4.18" May 17 00:40:17.363082 env[1411]: 2025-05-17 00:40:17.313 [INFO][3008] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.76.66/26] block=192.168.76.64/26 handle="k8s-pod-network.cb78e895e4bf99d07358472dc9154532fd60e24e9a115abd3747e8b590c43856" host="10.200.4.18" May 17 00:40:17.363082 env[1411]: 2025-05-17 00:40:17.314 [INFO][3008] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.76.66/26] handle="k8s-pod-network.cb78e895e4bf99d07358472dc9154532fd60e24e9a115abd3747e8b590c43856" host="10.200.4.18" May 17 00:40:17.363082 env[1411]: 2025-05-17 00:40:17.314 [INFO][3008] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:40:17.363082 env[1411]: 2025-05-17 00:40:17.314 [INFO][3008] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.76.66/26] IPv6=[] ContainerID="cb78e895e4bf99d07358472dc9154532fd60e24e9a115abd3747e8b590c43856" HandleID="k8s-pod-network.cb78e895e4bf99d07358472dc9154532fd60e24e9a115abd3747e8b590c43856" Workload="10.200.4.18-k8s-nginx--deployment--7fcdb87857--9kkwx-eth0" May 17 00:40:17.364156 env[1411]: 2025-05-17 00:40:17.315 [INFO][2993] cni-plugin/k8s.go 418: Populated endpoint ContainerID="cb78e895e4bf99d07358472dc9154532fd60e24e9a115abd3747e8b590c43856" Namespace="default" Pod="nginx-deployment-7fcdb87857-9kkwx" WorkloadEndpoint="10.200.4.18-k8s-nginx--deployment--7fcdb87857--9kkwx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.18-k8s-nginx--deployment--7fcdb87857--9kkwx-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"9f88e28f-2a3c-4227-88be-aeaa28287898", ResourceVersion:"1624", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 40, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.18", ContainerID:"", Pod:"nginx-deployment-7fcdb87857-9kkwx", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.76.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calia7ffd5f8aff", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:40:17.364156 env[1411]: 2025-05-17 00:40:17.315 [INFO][2993] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.76.66/32] ContainerID="cb78e895e4bf99d07358472dc9154532fd60e24e9a115abd3747e8b590c43856" Namespace="default" Pod="nginx-deployment-7fcdb87857-9kkwx" WorkloadEndpoint="10.200.4.18-k8s-nginx--deployment--7fcdb87857--9kkwx-eth0" May 17 00:40:17.364156 env[1411]: 2025-05-17 00:40:17.315 [INFO][2993] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calia7ffd5f8aff ContainerID="cb78e895e4bf99d07358472dc9154532fd60e24e9a115abd3747e8b590c43856" Namespace="default" Pod="nginx-deployment-7fcdb87857-9kkwx" WorkloadEndpoint="10.200.4.18-k8s-nginx--deployment--7fcdb87857--9kkwx-eth0" May 17 00:40:17.364156 env[1411]: 2025-05-17 00:40:17.327 [INFO][2993] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="cb78e895e4bf99d07358472dc9154532fd60e24e9a115abd3747e8b590c43856" Namespace="default" Pod="nginx-deployment-7fcdb87857-9kkwx" WorkloadEndpoint="10.200.4.18-k8s-nginx--deployment--7fcdb87857--9kkwx-eth0" May 17 00:40:17.364156 env[1411]: 2025-05-17 00:40:17.332 [INFO][2993] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="cb78e895e4bf99d07358472dc9154532fd60e24e9a115abd3747e8b590c43856" Namespace="default" Pod="nginx-deployment-7fcdb87857-9kkwx" WorkloadEndpoint="10.200.4.18-k8s-nginx--deployment--7fcdb87857--9kkwx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.18-k8s-nginx--deployment--7fcdb87857--9kkwx-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"9f88e28f-2a3c-4227-88be-aeaa28287898", ResourceVersion:"1624", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 40, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.18", ContainerID:"cb78e895e4bf99d07358472dc9154532fd60e24e9a115abd3747e8b590c43856", Pod:"nginx-deployment-7fcdb87857-9kkwx", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.76.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calia7ffd5f8aff", MAC:"96:2a:4a:68:11:95", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:40:17.364156 env[1411]: 2025-05-17 00:40:17.349 [INFO][2993] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="cb78e895e4bf99d07358472dc9154532fd60e24e9a115abd3747e8b590c43856" Namespace="default" Pod="nginx-deployment-7fcdb87857-9kkwx" WorkloadEndpoint="10.200.4.18-k8s-nginx--deployment--7fcdb87857--9kkwx-eth0" May 17 00:40:17.365000 audit[3032]: NETFILTER_CFG table=filter:73 family=2 entries=42 op=nft_register_chain pid=3032 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:40:17.365000 audit[3032]: SYSCALL arch=c000003e syscall=46 success=yes exit=22512 a0=3 a1=7ffff0c33240 a2=0 a3=7ffff0c3322c items=0 ppid=2668 pid=3032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:17.365000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:40:17.379986 systemd[1]: Started cri-containerd-038c255493f2c97c3ef914688c59e3cf6844b926d81aba63958525c688bd40d5.scope. May 17 00:40:17.399101 env[1411]: time="2025-05-17T00:40:17.398874408Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:40:17.399101 env[1411]: time="2025-05-17T00:40:17.398921912Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:40:17.399101 env[1411]: time="2025-05-17T00:40:17.398939313Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:40:17.399404 env[1411]: time="2025-05-17T00:40:17.399144932Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cb78e895e4bf99d07358472dc9154532fd60e24e9a115abd3747e8b590c43856 pid=3055 runtime=io.containerd.runc.v2 May 17 00:40:17.403000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.403000 audit[3033]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7f24091e92d8 items=0 ppid=2892 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:17.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033386332353534393366326339376333656639313436383863353965 May 17 00:40:17.403000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.403000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.403000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.403000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.403000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.403000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.403000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.403000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.403000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.403000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.403000 audit: BPF prog-id=108 op=LOAD May 17 00:40:17.403000 audit[3033]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001499d8 a2=78 a3=c000261dc8 items=0 ppid=2892 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:17.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033386332353534393366326339376333656639313436383863353965 May 17 00:40:17.403000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.403000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.403000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.403000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.403000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.403000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.403000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.403000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.403000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.403000 audit: BPF prog-id=109 op=LOAD May 17 00:40:17.403000 audit[3033]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000149770 a2=78 a3=c000261e18 items=0 ppid=2892 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:17.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033386332353534393366326339376333656639313436383863353965 May 17 00:40:17.403000 audit: BPF prog-id=109 op=UNLOAD May 17 00:40:17.403000 audit: BPF prog-id=108 op=UNLOAD May 17 00:40:17.403000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.403000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.403000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.403000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.403000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.403000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.403000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.403000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.403000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.403000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.403000 audit: BPF prog-id=110 op=LOAD May 17 00:40:17.403000 audit[3033]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000149c30 a2=78 a3=c000261ea8 items=0 ppid=2892 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:17.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033386332353534393366326339376333656639313436383863353965 May 17 00:40:17.422697 systemd[1]: Started cri-containerd-cb78e895e4bf99d07358472dc9154532fd60e24e9a115abd3747e8b590c43856.scope. May 17 00:40:17.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.441000 audit: BPF prog-id=111 op=LOAD May 17 00:40:17.442000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.442000 audit[3065]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3055 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:17.442000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362373865383935653462663939643037333538343732646339313534 May 17 00:40:17.442000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.442000 audit[3065]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3055 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:17.442000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362373865383935653462663939643037333538343732646339313534 May 17 00:40:17.442000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.442000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.442000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.442000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.442000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.442000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.442000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.442000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.442000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.442000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.442000 audit: BPF prog-id=112 op=LOAD May 17 00:40:17.442000 audit[3065]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000025230 items=0 ppid=3055 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:17.442000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362373865383935653462663939643037333538343732646339313534 May 17 00:40:17.442000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.442000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.442000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.442000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.442000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.442000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.442000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.442000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.442000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.442000 audit: BPF prog-id=113 op=LOAD May 17 00:40:17.442000 audit[3065]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000025278 items=0 ppid=3055 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:17.442000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362373865383935653462663939643037333538343732646339313534 May 17 00:40:17.442000 audit: BPF prog-id=113 op=UNLOAD May 17 00:40:17.442000 audit: BPF prog-id=112 op=UNLOAD May 17 00:40:17.442000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.442000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.442000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.442000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.442000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.442000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.442000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.442000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.442000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.442000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:17.442000 audit: BPF prog-id=114 op=LOAD May 17 00:40:17.442000 audit[3065]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000025688 items=0 ppid=3055 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:17.442000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362373865383935653462663939643037333538343732646339313534 May 17 00:40:17.448098 env[1411]: time="2025-05-17T00:40:17.445450151Z" level=info msg="StartContainer for \"038c255493f2c97c3ef914688c59e3cf6844b926d81aba63958525c688bd40d5\" returns successfully" May 17 00:40:17.476609 env[1411]: time="2025-05-17T00:40:17.476546517Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-9kkwx,Uid:9f88e28f-2a3c-4227-88be-aeaa28287898,Namespace:default,Attempt:1,} returns sandbox id \"cb78e895e4bf99d07358472dc9154532fd60e24e9a115abd3747e8b590c43856\"" May 17 00:40:17.478347 env[1411]: time="2025-05-17T00:40:17.478313274Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 17 00:40:17.939002 kubelet[1859]: E0517 00:40:17.938933 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:18.020579 kubelet[1859]: I0517 00:40:18.020519 1859 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 17 00:40:18.020579 kubelet[1859]: I0517 00:40:18.020581 1859 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 17 00:40:18.749873 systemd-networkd[1562]: calia7ffd5f8aff: Gained IPv6LL May 17 00:40:18.939457 kubelet[1859]: E0517 00:40:18.939363 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:19.940205 kubelet[1859]: E0517 00:40:19.940132 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:20.702364 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1726313794.mount: Deactivated successfully. May 17 00:40:20.911912 kubelet[1859]: E0517 00:40:20.911871 1859 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:20.940848 kubelet[1859]: E0517 00:40:20.940785 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:21.941121 kubelet[1859]: E0517 00:40:21.941067 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:22.263538 env[1411]: time="2025-05-17T00:40:22.263486763Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:22.271036 env[1411]: time="2025-05-17T00:40:22.270991849Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:22.276730 env[1411]: time="2025-05-17T00:40:22.276692694Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:22.281432 env[1411]: time="2025-05-17T00:40:22.281388761Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:22.282118 env[1411]: time="2025-05-17T00:40:22.282082415Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa\"" May 17 00:40:22.284927 env[1411]: time="2025-05-17T00:40:22.284893934Z" level=info msg="CreateContainer within sandbox \"cb78e895e4bf99d07358472dc9154532fd60e24e9a115abd3747e8b590c43856\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" May 17 00:40:22.339849 env[1411]: time="2025-05-17T00:40:22.339790421Z" level=info msg="CreateContainer within sandbox \"cb78e895e4bf99d07358472dc9154532fd60e24e9a115abd3747e8b590c43856\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"31ec321e5ac7e4f25530e2487165dcd304cda1c4f6d79a5339497430829c3bda\"" May 17 00:40:22.340689 env[1411]: time="2025-05-17T00:40:22.340656189Z" level=info msg="StartContainer for \"31ec321e5ac7e4f25530e2487165dcd304cda1c4f6d79a5339497430829c3bda\"" May 17 00:40:22.365443 systemd[1]: Started cri-containerd-31ec321e5ac7e4f25530e2487165dcd304cda1c4f6d79a5339497430829c3bda.scope. May 17 00:40:22.396459 kernel: kauditd_printk_skb: 196 callbacks suppressed May 17 00:40:22.396634 kernel: audit: type=1400 audit(1747442422.376:696): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:22.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:22.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:22.409746 kernel: audit: type=1400 audit(1747442422.376:697): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:22.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:22.422577 kernel: audit: type=1400 audit(1747442422.376:698): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:22.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:22.437052 kernel: audit: type=1400 audit(1747442422.376:699): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:22.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:22.449744 kernel: audit: type=1400 audit(1747442422.376:700): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:22.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:22.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:22.472791 kernel: audit: type=1400 audit(1747442422.376:701): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:22.472887 kernel: audit: type=1400 audit(1747442422.376:702): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:22.472909 kernel: audit: type=1400 audit(1747442422.376:703): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:22.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:22.487604 kernel: audit: type=1400 audit(1747442422.376:704): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:22.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:22.487995 env[1411]: time="2025-05-17T00:40:22.487956190Z" level=info msg="StartContainer for \"31ec321e5ac7e4f25530e2487165dcd304cda1c4f6d79a5339497430829c3bda\" returns successfully" May 17 00:40:22.508730 kernel: audit: type=1400 audit(1747442422.376:705): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:22.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:22.376000 audit: BPF prog-id=115 op=LOAD May 17 00:40:22.376000 audit[3118]: AVC avc: denied { bpf } for pid=3118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:22.376000 audit[3118]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3055 pid=3118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:22.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331656333323165356163376534663235353330653234383731363564 May 17 00:40:22.377000 audit[3118]: AVC avc: denied { perfmon } for pid=3118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:22.377000 audit[3118]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=3055 pid=3118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:22.377000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331656333323165356163376534663235353330653234383731363564 May 17 00:40:22.377000 audit[3118]: AVC avc: denied { bpf } for pid=3118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:22.377000 audit[3118]: AVC avc: denied { bpf } for pid=3118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:22.377000 audit[3118]: AVC avc: denied { bpf } for pid=3118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:22.377000 audit[3118]: AVC avc: denied { perfmon } for pid=3118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:22.377000 audit[3118]: AVC avc: denied { perfmon } for pid=3118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:22.377000 audit[3118]: AVC avc: denied { perfmon } for pid=3118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:22.377000 audit[3118]: AVC avc: denied { perfmon } for pid=3118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:22.377000 audit[3118]: AVC avc: denied { perfmon } for pid=3118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:22.377000 audit[3118]: AVC avc: denied { bpf } for pid=3118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:22.377000 audit[3118]: AVC avc: denied { bpf } for pid=3118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:22.377000 audit: BPF prog-id=116 op=LOAD May 17 00:40:22.377000 audit[3118]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0002fbdc0 items=0 ppid=3055 pid=3118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:22.377000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331656333323165356163376534663235353330653234383731363564 May 17 00:40:22.394000 audit[3118]: AVC avc: denied { bpf } for pid=3118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:22.394000 audit[3118]: AVC avc: denied { bpf } for pid=3118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:22.394000 audit[3118]: AVC avc: denied { perfmon } for pid=3118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:22.394000 audit[3118]: AVC avc: denied { perfmon } for pid=3118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:22.394000 audit[3118]: AVC avc: denied { perfmon } for pid=3118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:22.394000 audit[3118]: AVC avc: denied { perfmon } for pid=3118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:22.394000 audit[3118]: AVC avc: denied { perfmon } for pid=3118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:22.394000 audit[3118]: AVC avc: denied { bpf } for pid=3118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:22.394000 audit[3118]: AVC avc: denied { bpf } for pid=3118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:22.394000 audit: BPF prog-id=117 op=LOAD May 17 00:40:22.394000 audit[3118]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000025bd8 items=0 ppid=3055 pid=3118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:22.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331656333323165356163376534663235353330653234383731363564 May 17 00:40:22.394000 audit: BPF prog-id=117 op=UNLOAD May 17 00:40:22.394000 audit: BPF prog-id=116 op=UNLOAD May 17 00:40:22.394000 audit[3118]: AVC avc: denied { bpf } for pid=3118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:22.394000 audit[3118]: AVC avc: denied { bpf } for pid=3118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:22.394000 audit[3118]: AVC avc: denied { bpf } for pid=3118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:22.394000 audit[3118]: AVC avc: denied { perfmon } for pid=3118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:22.394000 audit[3118]: AVC avc: denied { perfmon } for pid=3118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:22.394000 audit[3118]: AVC avc: denied { perfmon } for pid=3118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:22.394000 audit[3118]: AVC avc: denied { perfmon } for pid=3118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:22.394000 audit[3118]: AVC avc: denied { perfmon } for pid=3118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:22.394000 audit[3118]: AVC avc: denied { bpf } for pid=3118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:22.394000 audit[3118]: AVC avc: denied { bpf } for pid=3118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:22.394000 audit: BPF prog-id=118 op=LOAD May 17 00:40:22.394000 audit[3118]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000025fe8 items=0 ppid=3055 pid=3118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:22.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331656333323165356163376534663235353330653234383731363564 May 17 00:40:22.941669 kubelet[1859]: E0517 00:40:22.941588 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:23.137743 kubelet[1859]: I0517 00:40:23.137684 1859 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-nt72n" podStartSLOduration=38.29958996 podStartE2EDuration="42.137667854s" podCreationTimestamp="2025-05-17 00:39:41 +0000 UTC" firstStartedPulling="2025-05-17 00:40:13.428183217 +0000 UTC m=+33.644525807" lastFinishedPulling="2025-05-17 00:40:17.266261011 +0000 UTC m=+37.482603701" observedRunningTime="2025-05-17 00:40:18.127103201 +0000 UTC m=+38.343445791" watchObservedRunningTime="2025-05-17 00:40:23.137667854 +0000 UTC m=+43.354010544" May 17 00:40:23.137983 kubelet[1859]: I0517 00:40:23.137844 1859 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-7fcdb87857-9kkwx" podStartSLOduration=16.332086466 podStartE2EDuration="21.137836167s" podCreationTimestamp="2025-05-17 00:40:02 +0000 UTC" firstStartedPulling="2025-05-17 00:40:17.477770926 +0000 UTC m=+37.694113516" lastFinishedPulling="2025-05-17 00:40:22.283520527 +0000 UTC m=+42.499863217" observedRunningTime="2025-05-17 00:40:23.137550645 +0000 UTC m=+43.353893335" watchObservedRunningTime="2025-05-17 00:40:23.137836167 +0000 UTC m=+43.354178757" May 17 00:40:23.942828 kubelet[1859]: E0517 00:40:23.942760 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:24.943692 kubelet[1859]: E0517 00:40:24.943629 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:25.944227 kubelet[1859]: E0517 00:40:25.944158 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:26.944795 kubelet[1859]: E0517 00:40:26.944732 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:27.945632 kubelet[1859]: E0517 00:40:27.945554 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:28.946206 kubelet[1859]: E0517 00:40:28.946135 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:29.947003 kubelet[1859]: E0517 00:40:29.946953 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:30.947270 kubelet[1859]: E0517 00:40:30.947217 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:31.476000 audit[3175]: NETFILTER_CFG table=filter:74 family=2 entries=24 op=nft_register_rule pid=3175 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:40:31.482007 kernel: kauditd_printk_skb: 47 callbacks suppressed May 17 00:40:31.482136 kernel: audit: type=1325 audit(1747442431.476:714): table=filter:74 family=2 entries=24 op=nft_register_rule pid=3175 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:40:31.476000 audit[3175]: SYSCALL arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7ffd822bf930 a2=0 a3=7ffd822bf91c items=0 ppid=2054 pid=3175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:31.509003 kernel: audit: type=1300 audit(1747442431.476:714): arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7ffd822bf930 a2=0 a3=7ffd822bf91c items=0 ppid=2054 pid=3175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:31.509656 kernel: audit: type=1327 audit(1747442431.476:714): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:40:31.476000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:40:31.517000 audit[3175]: NETFILTER_CFG table=nat:75 family=2 entries=22 op=nft_register_rule pid=3175 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:40:31.517000 audit[3175]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd822bf930 a2=0 a3=0 items=0 ppid=2054 pid=3175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:31.535151 systemd[1]: Created slice kubepods-besteffort-poda2ec6b1d_ee5a_4386_823b_0d96c59fe5a6.slice. May 17 00:40:31.545443 kernel: audit: type=1325 audit(1747442431.517:715): table=nat:75 family=2 entries=22 op=nft_register_rule pid=3175 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:40:31.551293 kernel: audit: type=1300 audit(1747442431.517:715): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd822bf930 a2=0 a3=0 items=0 ppid=2054 pid=3175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:31.551355 kernel: audit: type=1327 audit(1747442431.517:715): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:40:31.517000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:40:31.553000 audit[3177]: NETFILTER_CFG table=filter:76 family=2 entries=36 op=nft_register_rule pid=3177 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:40:31.565497 kernel: audit: type=1325 audit(1747442431.553:716): table=filter:76 family=2 entries=36 op=nft_register_rule pid=3177 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:40:31.565651 kernel: audit: type=1300 audit(1747442431.553:716): arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7ffec79abd00 a2=0 a3=7ffec79abcec items=0 ppid=2054 pid=3177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:31.553000 audit[3177]: SYSCALL arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7ffec79abd00 a2=0 a3=7ffec79abcec items=0 ppid=2054 pid=3177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:31.553000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:40:31.591008 kernel: audit: type=1327 audit(1747442431.553:716): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:40:31.591000 audit[3177]: NETFILTER_CFG table=nat:77 family=2 entries=22 op=nft_register_rule pid=3177 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:40:31.591000 audit[3177]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffec79abd00 a2=0 a3=0 items=0 ppid=2054 pid=3177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:31.591000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:40:31.603590 kernel: audit: type=1325 audit(1747442431.591:717): table=nat:77 family=2 entries=22 op=nft_register_rule pid=3177 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:40:31.690113 kubelet[1859]: I0517 00:40:31.690065 1859 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/a2ec6b1d-ee5a-4386-823b-0d96c59fe5a6-data\") pod \"nfs-server-provisioner-0\" (UID: \"a2ec6b1d-ee5a-4386-823b-0d96c59fe5a6\") " pod="default/nfs-server-provisioner-0" May 17 00:40:31.690294 kubelet[1859]: I0517 00:40:31.690131 1859 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-245x2\" (UniqueName: \"kubernetes.io/projected/a2ec6b1d-ee5a-4386-823b-0d96c59fe5a6-kube-api-access-245x2\") pod \"nfs-server-provisioner-0\" (UID: \"a2ec6b1d-ee5a-4386-823b-0d96c59fe5a6\") " pod="default/nfs-server-provisioner-0" May 17 00:40:31.839217 env[1411]: time="2025-05-17T00:40:31.839166515Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:a2ec6b1d-ee5a-4386-823b-0d96c59fe5a6,Namespace:default,Attempt:0,}" May 17 00:40:31.948294 kubelet[1859]: E0517 00:40:31.948241 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:32.949380 kubelet[1859]: E0517 00:40:32.949312 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:33.718226 systemd-networkd[1562]: cali60e51b789ff: Link UP May 17 00:40:33.728048 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:40:33.728169 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready May 17 00:40:33.728538 systemd-networkd[1562]: cali60e51b789ff: Gained carrier May 17 00:40:33.744797 env[1411]: 2025-05-17 00:40:33.657 [INFO][3180] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.4.18-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default a2ec6b1d-ee5a-4386-823b-0d96c59fe5a6 1692 0 2025-05-17 00:40:31 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.200.4.18 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="d34c9ea5744588d363ea11ab242098ac70c2b1e4a88ac28da404e07544b55adf" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.4.18-k8s-nfs--server--provisioner--0-" May 17 00:40:33.744797 env[1411]: 2025-05-17 00:40:33.657 [INFO][3180] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="d34c9ea5744588d363ea11ab242098ac70c2b1e4a88ac28da404e07544b55adf" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.4.18-k8s-nfs--server--provisioner--0-eth0" May 17 00:40:33.744797 env[1411]: 2025-05-17 00:40:33.681 [INFO][3192] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d34c9ea5744588d363ea11ab242098ac70c2b1e4a88ac28da404e07544b55adf" HandleID="k8s-pod-network.d34c9ea5744588d363ea11ab242098ac70c2b1e4a88ac28da404e07544b55adf" Workload="10.200.4.18-k8s-nfs--server--provisioner--0-eth0" May 17 00:40:33.744797 env[1411]: 2025-05-17 00:40:33.681 [INFO][3192] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d34c9ea5744588d363ea11ab242098ac70c2b1e4a88ac28da404e07544b55adf" HandleID="k8s-pod-network.d34c9ea5744588d363ea11ab242098ac70c2b1e4a88ac28da404e07544b55adf" Workload="10.200.4.18-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002c7c70), Attrs:map[string]string{"namespace":"default", "node":"10.200.4.18", "pod":"nfs-server-provisioner-0", "timestamp":"2025-05-17 00:40:33.681170259 +0000 UTC"}, Hostname:"10.200.4.18", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:40:33.744797 env[1411]: 2025-05-17 00:40:33.681 [INFO][3192] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:40:33.744797 env[1411]: 2025-05-17 00:40:33.681 [INFO][3192] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:40:33.744797 env[1411]: 2025-05-17 00:40:33.681 [INFO][3192] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.4.18' May 17 00:40:33.744797 env[1411]: 2025-05-17 00:40:33.688 [INFO][3192] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.d34c9ea5744588d363ea11ab242098ac70c2b1e4a88ac28da404e07544b55adf" host="10.200.4.18" May 17 00:40:33.744797 env[1411]: 2025-05-17 00:40:33.693 [INFO][3192] ipam/ipam.go 394: Looking up existing affinities for host host="10.200.4.18" May 17 00:40:33.744797 env[1411]: 2025-05-17 00:40:33.697 [INFO][3192] ipam/ipam.go 511: Trying affinity for 192.168.76.64/26 host="10.200.4.18" May 17 00:40:33.744797 env[1411]: 2025-05-17 00:40:33.698 [INFO][3192] ipam/ipam.go 158: Attempting to load block cidr=192.168.76.64/26 host="10.200.4.18" May 17 00:40:33.744797 env[1411]: 2025-05-17 00:40:33.700 [INFO][3192] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.76.64/26 host="10.200.4.18" May 17 00:40:33.744797 env[1411]: 2025-05-17 00:40:33.700 [INFO][3192] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.76.64/26 handle="k8s-pod-network.d34c9ea5744588d363ea11ab242098ac70c2b1e4a88ac28da404e07544b55adf" host="10.200.4.18" May 17 00:40:33.744797 env[1411]: 2025-05-17 00:40:33.702 [INFO][3192] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.d34c9ea5744588d363ea11ab242098ac70c2b1e4a88ac28da404e07544b55adf May 17 00:40:33.744797 env[1411]: 2025-05-17 00:40:33.706 [INFO][3192] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.76.64/26 handle="k8s-pod-network.d34c9ea5744588d363ea11ab242098ac70c2b1e4a88ac28da404e07544b55adf" host="10.200.4.18" May 17 00:40:33.744797 env[1411]: 2025-05-17 00:40:33.714 [INFO][3192] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.76.67/26] block=192.168.76.64/26 handle="k8s-pod-network.d34c9ea5744588d363ea11ab242098ac70c2b1e4a88ac28da404e07544b55adf" host="10.200.4.18" May 17 00:40:33.744797 env[1411]: 2025-05-17 00:40:33.714 [INFO][3192] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.76.67/26] handle="k8s-pod-network.d34c9ea5744588d363ea11ab242098ac70c2b1e4a88ac28da404e07544b55adf" host="10.200.4.18" May 17 00:40:33.744797 env[1411]: 2025-05-17 00:40:33.714 [INFO][3192] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:40:33.744797 env[1411]: 2025-05-17 00:40:33.714 [INFO][3192] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.76.67/26] IPv6=[] ContainerID="d34c9ea5744588d363ea11ab242098ac70c2b1e4a88ac28da404e07544b55adf" HandleID="k8s-pod-network.d34c9ea5744588d363ea11ab242098ac70c2b1e4a88ac28da404e07544b55adf" Workload="10.200.4.18-k8s-nfs--server--provisioner--0-eth0" May 17 00:40:33.751007 env[1411]: 2025-05-17 00:40:33.715 [INFO][3180] cni-plugin/k8s.go 418: Populated endpoint ContainerID="d34c9ea5744588d363ea11ab242098ac70c2b1e4a88ac28da404e07544b55adf" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.4.18-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.18-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"a2ec6b1d-ee5a-4386-823b-0d96c59fe5a6", ResourceVersion:"1692", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 40, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.18", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.76.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:40:33.751007 env[1411]: 2025-05-17 00:40:33.716 [INFO][3180] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.76.67/32] ContainerID="d34c9ea5744588d363ea11ab242098ac70c2b1e4a88ac28da404e07544b55adf" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.4.18-k8s-nfs--server--provisioner--0-eth0" May 17 00:40:33.751007 env[1411]: 2025-05-17 00:40:33.716 [INFO][3180] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="d34c9ea5744588d363ea11ab242098ac70c2b1e4a88ac28da404e07544b55adf" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.4.18-k8s-nfs--server--provisioner--0-eth0" May 17 00:40:33.751007 env[1411]: 2025-05-17 00:40:33.729 [INFO][3180] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d34c9ea5744588d363ea11ab242098ac70c2b1e4a88ac28da404e07544b55adf" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.4.18-k8s-nfs--server--provisioner--0-eth0" May 17 00:40:33.751237 env[1411]: 2025-05-17 00:40:33.729 [INFO][3180] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="d34c9ea5744588d363ea11ab242098ac70c2b1e4a88ac28da404e07544b55adf" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.4.18-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.18-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"a2ec6b1d-ee5a-4386-823b-0d96c59fe5a6", ResourceVersion:"1692", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 40, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.18", ContainerID:"d34c9ea5744588d363ea11ab242098ac70c2b1e4a88ac28da404e07544b55adf", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.76.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"0a:7e:a5:e5:f7:32", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:40:33.751237 env[1411]: 2025-05-17 00:40:33.740 [INFO][3180] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="d34c9ea5744588d363ea11ab242098ac70c2b1e4a88ac28da404e07544b55adf" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.4.18-k8s-nfs--server--provisioner--0-eth0" May 17 00:40:33.754000 audit[3209]: NETFILTER_CFG table=filter:78 family=2 entries=40 op=nft_register_chain pid=3209 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:40:33.754000 audit[3209]: SYSCALL arch=c000003e syscall=46 success=yes exit=20756 a0=3 a1=7ffd0a7fe530 a2=0 a3=7ffd0a7fe51c items=0 ppid=2668 pid=3209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:33.754000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:40:33.768080 env[1411]: time="2025-05-17T00:40:33.767997822Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:40:33.768614 env[1411]: time="2025-05-17T00:40:33.768046825Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:40:33.768614 env[1411]: time="2025-05-17T00:40:33.768308041Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:40:33.768614 env[1411]: time="2025-05-17T00:40:33.768551055Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d34c9ea5744588d363ea11ab242098ac70c2b1e4a88ac28da404e07544b55adf pid=3218 runtime=io.containerd.runc.v2 May 17 00:40:33.793675 systemd[1]: Started cri-containerd-d34c9ea5744588d363ea11ab242098ac70c2b1e4a88ac28da404e07544b55adf.scope. May 17 00:40:33.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.806000 audit: BPF prog-id=119 op=LOAD May 17 00:40:33.806000 audit[3227]: AVC avc: denied { bpf } for pid=3227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.806000 audit[3227]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3218 pid=3227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:33.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433346339656135373434353838643336336561313161623234323039 May 17 00:40:33.807000 audit[3227]: AVC avc: denied { perfmon } for pid=3227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.807000 audit[3227]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3218 pid=3227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:33.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433346339656135373434353838643336336561313161623234323039 May 17 00:40:33.807000 audit[3227]: AVC avc: denied { bpf } for pid=3227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.807000 audit[3227]: AVC avc: denied { bpf } for pid=3227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.807000 audit[3227]: AVC avc: denied { bpf } for pid=3227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.807000 audit[3227]: AVC avc: denied { perfmon } for pid=3227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.807000 audit[3227]: AVC avc: denied { perfmon } for pid=3227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.807000 audit[3227]: AVC avc: denied { perfmon } for pid=3227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.807000 audit[3227]: AVC avc: denied { perfmon } for pid=3227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.807000 audit[3227]: AVC avc: denied { perfmon } for pid=3227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.807000 audit[3227]: AVC avc: denied { bpf } for pid=3227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.807000 audit[3227]: AVC avc: denied { bpf } for pid=3227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.807000 audit: BPF prog-id=120 op=LOAD May 17 00:40:33.807000 audit[3227]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000220d40 items=0 ppid=3218 pid=3227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:33.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433346339656135373434353838643336336561313161623234323039 May 17 00:40:33.807000 audit[3227]: AVC avc: denied { bpf } for pid=3227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.807000 audit[3227]: AVC avc: denied { bpf } for pid=3227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.807000 audit[3227]: AVC avc: denied { perfmon } for pid=3227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.807000 audit[3227]: AVC avc: denied { perfmon } for pid=3227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.807000 audit[3227]: AVC avc: denied { perfmon } for pid=3227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.807000 audit[3227]: AVC avc: denied { perfmon } for pid=3227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.807000 audit[3227]: AVC avc: denied { perfmon } for pid=3227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.807000 audit[3227]: AVC avc: denied { bpf } for pid=3227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.807000 audit[3227]: AVC avc: denied { bpf } for pid=3227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.807000 audit: BPF prog-id=121 op=LOAD May 17 00:40:33.807000 audit[3227]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000220d88 items=0 ppid=3218 pid=3227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:33.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433346339656135373434353838643336336561313161623234323039 May 17 00:40:33.808000 audit: BPF prog-id=121 op=UNLOAD May 17 00:40:33.808000 audit: BPF prog-id=120 op=UNLOAD May 17 00:40:33.808000 audit[3227]: AVC avc: denied { bpf } for pid=3227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.808000 audit[3227]: AVC avc: denied { bpf } for pid=3227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.808000 audit[3227]: AVC avc: denied { bpf } for pid=3227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.808000 audit[3227]: AVC avc: denied { perfmon } for pid=3227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.808000 audit[3227]: AVC avc: denied { perfmon } for pid=3227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.808000 audit[3227]: AVC avc: denied { perfmon } for pid=3227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.808000 audit[3227]: AVC avc: denied { perfmon } for pid=3227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.808000 audit[3227]: AVC avc: denied { perfmon } for pid=3227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.808000 audit[3227]: AVC avc: denied { bpf } for pid=3227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.808000 audit[3227]: AVC avc: denied { bpf } for pid=3227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:33.808000 audit: BPF prog-id=122 op=LOAD May 17 00:40:33.808000 audit[3227]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000221198 items=0 ppid=3218 pid=3227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:33.808000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433346339656135373434353838643336336561313161623234323039 May 17 00:40:33.838829 env[1411]: time="2025-05-17T00:40:33.838225998Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:a2ec6b1d-ee5a-4386-823b-0d96c59fe5a6,Namespace:default,Attempt:0,} returns sandbox id \"d34c9ea5744588d363ea11ab242098ac70c2b1e4a88ac28da404e07544b55adf\"" May 17 00:40:33.840235 env[1411]: time="2025-05-17T00:40:33.840203716Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" May 17 00:40:33.950404 kubelet[1859]: E0517 00:40:33.950326 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:34.877854 systemd-networkd[1562]: cali60e51b789ff: Gained IPv6LL May 17 00:40:34.950649 kubelet[1859]: E0517 00:40:34.950590 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:35.951377 kubelet[1859]: E0517 00:40:35.951319 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:36.590237 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1766460359.mount: Deactivated successfully. May 17 00:40:36.952035 kubelet[1859]: E0517 00:40:36.951636 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:37.952183 kubelet[1859]: E0517 00:40:37.952135 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:38.710145 env[1411]: time="2025-05-17T00:40:38.710087157Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:38.721003 env[1411]: time="2025-05-17T00:40:38.720949232Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:38.728148 env[1411]: time="2025-05-17T00:40:38.728097110Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:38.732829 env[1411]: time="2025-05-17T00:40:38.732777658Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:40:38.733489 env[1411]: time="2025-05-17T00:40:38.733448893Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" May 17 00:40:38.736157 env[1411]: time="2025-05-17T00:40:38.736121034Z" level=info msg="CreateContainer within sandbox \"d34c9ea5744588d363ea11ab242098ac70c2b1e4a88ac28da404e07544b55adf\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" May 17 00:40:38.768877 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount103214125.mount: Deactivated successfully. May 17 00:40:38.794623 env[1411]: time="2025-05-17T00:40:38.794553727Z" level=info msg="CreateContainer within sandbox \"d34c9ea5744588d363ea11ab242098ac70c2b1e4a88ac28da404e07544b55adf\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"334a7b1149f7345de07db8f51243a9f7e85ee7f44c29b29a83482d5a5f88e6d3\"" May 17 00:40:38.795628 env[1411]: time="2025-05-17T00:40:38.795585481Z" level=info msg="StartContainer for \"334a7b1149f7345de07db8f51243a9f7e85ee7f44c29b29a83482d5a5f88e6d3\"" May 17 00:40:38.817959 systemd[1]: Started cri-containerd-334a7b1149f7345de07db8f51243a9f7e85ee7f44c29b29a83482d5a5f88e6d3.scope. May 17 00:40:38.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:38.837811 kernel: kauditd_printk_skb: 62 callbacks suppressed May 17 00:40:38.837950 kernel: audit: type=1400 audit(1747442438.832:737): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:38.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:38.862559 kernel: audit: type=1400 audit(1747442438.832:738): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:38.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:38.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:38.887299 kernel: audit: type=1400 audit(1747442438.832:739): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:38.887460 kernel: audit: type=1400 audit(1747442438.832:740): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:38.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:38.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:38.911003 kernel: audit: type=1400 audit(1747442438.832:741): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:38.911139 kernel: audit: type=1400 audit(1747442438.832:742): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:38.911174 kernel: audit: type=1400 audit(1747442438.832:743): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:38.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:38.936839 kernel: audit: type=1400 audit(1747442438.832:744): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:38.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:38.949950 kernel: audit: type=1400 audit(1747442438.832:745): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:38.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:38.962932 kernel: audit: type=1400 audit(1747442438.832:746): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:38.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:38.963264 kubelet[1859]: E0517 00:40:38.953270 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:38.832000 audit: BPF prog-id=123 op=LOAD May 17 00:40:38.833000 audit[3261]: AVC avc: denied { bpf } for pid=3261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:38.833000 audit[3261]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3218 pid=3261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:38.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333346137623131343966373334356465303764623866353132343361 May 17 00:40:38.833000 audit[3261]: AVC avc: denied { perfmon } for pid=3261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:38.833000 audit[3261]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3218 pid=3261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:38.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333346137623131343966373334356465303764623866353132343361 May 17 00:40:38.833000 audit[3261]: AVC avc: denied { bpf } for pid=3261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:38.833000 audit[3261]: AVC avc: denied { bpf } for pid=3261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:38.833000 audit[3261]: AVC avc: denied { bpf } for pid=3261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:38.833000 audit[3261]: AVC avc: denied { perfmon } for pid=3261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:38.833000 audit[3261]: AVC avc: denied { perfmon } for pid=3261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:38.833000 audit[3261]: AVC avc: denied { perfmon } for pid=3261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:38.833000 audit[3261]: AVC avc: denied { perfmon } for pid=3261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:38.964593 env[1411]: time="2025-05-17T00:40:38.964536322Z" level=info msg="StartContainer for \"334a7b1149f7345de07db8f51243a9f7e85ee7f44c29b29a83482d5a5f88e6d3\" returns successfully" May 17 00:40:38.833000 audit[3261]: AVC avc: denied { perfmon } for pid=3261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:38.833000 audit[3261]: AVC avc: denied { bpf } for pid=3261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:38.833000 audit[3261]: AVC avc: denied { bpf } for pid=3261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:38.833000 audit: BPF prog-id=124 op=LOAD May 17 00:40:38.833000 audit[3261]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002b1670 items=0 ppid=3218 pid=3261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:38.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333346137623131343966373334356465303764623866353132343361 May 17 00:40:38.849000 audit[3261]: AVC avc: denied { bpf } for pid=3261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:38.849000 audit[3261]: AVC avc: denied { bpf } for pid=3261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:38.849000 audit[3261]: AVC avc: denied { perfmon } for pid=3261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:38.849000 audit[3261]: AVC avc: denied { perfmon } for pid=3261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:38.849000 audit[3261]: AVC avc: denied { perfmon } for pid=3261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:38.849000 audit[3261]: AVC avc: denied { perfmon } for pid=3261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:38.849000 audit[3261]: AVC avc: denied { perfmon } for pid=3261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:38.849000 audit[3261]: AVC avc: denied { bpf } for pid=3261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:38.849000 audit[3261]: AVC avc: denied { bpf } for pid=3261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:38.849000 audit: BPF prog-id=125 op=LOAD May 17 00:40:38.849000 audit[3261]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002b16b8 items=0 ppid=3218 pid=3261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:38.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333346137623131343966373334356465303764623866353132343361 May 17 00:40:38.849000 audit: BPF prog-id=125 op=UNLOAD May 17 00:40:38.849000 audit: BPF prog-id=124 op=UNLOAD May 17 00:40:38.849000 audit[3261]: AVC avc: denied { bpf } for pid=3261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:38.849000 audit[3261]: AVC avc: denied { bpf } for pid=3261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:38.849000 audit[3261]: AVC avc: denied { bpf } for pid=3261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:38.849000 audit[3261]: AVC avc: denied { perfmon } for pid=3261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:38.849000 audit[3261]: AVC avc: denied { perfmon } for pid=3261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:38.849000 audit[3261]: AVC avc: denied { perfmon } for pid=3261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:38.849000 audit[3261]: AVC avc: denied { perfmon } for pid=3261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:38.849000 audit[3261]: AVC avc: denied { perfmon } for pid=3261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:38.849000 audit[3261]: AVC avc: denied { bpf } for pid=3261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:38.849000 audit[3261]: AVC avc: denied { bpf } for pid=3261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:38.849000 audit: BPF prog-id=126 op=LOAD May 17 00:40:38.849000 audit[3261]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002b1ac8 items=0 ppid=3218 pid=3261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:38.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333346137623131343966373334356465303764623866353132343361 May 17 00:40:38.979000 audit[3290]: AVC avc: denied { search } for pid=3290 comm="rpcbind" name="crypto" dev="proc" ino=25398 scontext=system_u:system_r:svirt_lxc_net_t:s0:c189,c323 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 17 00:40:38.979000 audit[3290]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f1bb75a70c0 a2=0 a3=0 items=0 ppid=3272 pid=3290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c189,c323 key=(null) May 17 00:40:38.979000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 May 17 00:40:39.019000 audit[3295]: AVC avc: denied { search } for pid=3295 comm="dbus-daemon" name="crypto" dev="proc" ino=25398 scontext=system_u:system_r:svirt_lxc_net_t:s0:c189,c323 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 17 00:40:39.019000 audit[3295]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f2ada6070c0 a2=0 a3=0 items=0 ppid=3272 pid=3295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c189,c323 key=(null) May 17 00:40:39.019000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 17 00:40:39.022000 audit[3296]: AVC avc: denied { watch } for pid=3296 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537521 scontext=system_u:system_r:svirt_lxc_net_t:s0:c189,c323 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c189,c323 tclass=dir permissive=0 May 17 00:40:39.022000 audit[3296]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55ca23c9ab50 a2=2c8 a3=7ffff57d41dc items=0 ppid=3272 pid=3296 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c189,c323 key=(null) May 17 00:40:39.022000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 17 00:40:39.031000 audit[3297]: AVC avc: denied { read } for pid=3297 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=26562 scontext=system_u:system_r:svirt_lxc_net_t:s0:c189,c323 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 May 17 00:40:39.031000 audit[3297]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f56c8301320 a1=80000 a2=d a3=7fff097a5a50 items=0 ppid=3272 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c189,c323 key=(null) May 17 00:40:39.031000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 17 00:40:39.032000 audit[3297]: AVC avc: denied { search } for pid=3297 comm="ganesha.nfsd" name="crypto" dev="proc" ino=25398 scontext=system_u:system_r:svirt_lxc_net_t:s0:c189,c323 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 17 00:40:39.032000 audit[3297]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f56c78550c0 a2=0 a3=0 items=0 ppid=3272 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c189,c323 key=(null) May 17 00:40:39.032000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 17 00:40:39.174202 kubelet[1859]: I0517 00:40:39.174148 1859 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=3.279081932 podStartE2EDuration="8.174130908s" podCreationTimestamp="2025-05-17 00:40:31 +0000 UTC" firstStartedPulling="2025-05-17 00:40:33.839666384 +0000 UTC m=+54.056008974" lastFinishedPulling="2025-05-17 00:40:38.73471526 +0000 UTC m=+58.951057950" observedRunningTime="2025-05-17 00:40:39.173798391 +0000 UTC m=+59.390141081" watchObservedRunningTime="2025-05-17 00:40:39.174130908 +0000 UTC m=+59.390473498" May 17 00:40:39.190000 audit[3324]: NETFILTER_CFG table=filter:79 family=2 entries=24 op=nft_register_rule pid=3324 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:40:39.190000 audit[3324]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffdb6287200 a2=0 a3=7ffdb62871ec items=0 ppid=2054 pid=3324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:39.190000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:40:39.195000 audit[3324]: NETFILTER_CFG table=nat:80 family=2 entries=106 op=nft_register_chain pid=3324 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:40:39.195000 audit[3324]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffdb6287200 a2=0 a3=7ffdb62871ec items=0 ppid=2054 pid=3324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:39.195000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:40:39.954140 kubelet[1859]: E0517 00:40:39.954079 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:40.912415 kubelet[1859]: E0517 00:40:40.912355 1859 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:40.944413 env[1411]: time="2025-05-17T00:40:40.944360006Z" level=info msg="StopPodSandbox for \"c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab\"" May 17 00:40:40.955725 kubelet[1859]: E0517 00:40:40.955688 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:41.019371 env[1411]: 2025-05-17 00:40:40.980 [WARNING][3334] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.18-k8s-nginx--deployment--7fcdb87857--9kkwx-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"9f88e28f-2a3c-4227-88be-aeaa28287898", ResourceVersion:"1655", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 40, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.18", ContainerID:"cb78e895e4bf99d07358472dc9154532fd60e24e9a115abd3747e8b590c43856", Pod:"nginx-deployment-7fcdb87857-9kkwx", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.76.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calia7ffd5f8aff", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:40:41.019371 env[1411]: 2025-05-17 00:40:40.980 [INFO][3334] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab" May 17 00:40:41.019371 env[1411]: 2025-05-17 00:40:40.980 [INFO][3334] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab" iface="eth0" netns="" May 17 00:40:41.019371 env[1411]: 2025-05-17 00:40:40.980 [INFO][3334] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab" May 17 00:40:41.019371 env[1411]: 2025-05-17 00:40:40.980 [INFO][3334] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab" May 17 00:40:41.019371 env[1411]: 2025-05-17 00:40:41.002 [INFO][3341] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab" HandleID="k8s-pod-network.c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab" Workload="10.200.4.18-k8s-nginx--deployment--7fcdb87857--9kkwx-eth0" May 17 00:40:41.019371 env[1411]: 2025-05-17 00:40:41.002 [INFO][3341] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:40:41.019371 env[1411]: 2025-05-17 00:40:41.002 [INFO][3341] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:40:41.019371 env[1411]: 2025-05-17 00:40:41.015 [WARNING][3341] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab" HandleID="k8s-pod-network.c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab" Workload="10.200.4.18-k8s-nginx--deployment--7fcdb87857--9kkwx-eth0" May 17 00:40:41.019371 env[1411]: 2025-05-17 00:40:41.015 [INFO][3341] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab" HandleID="k8s-pod-network.c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab" Workload="10.200.4.18-k8s-nginx--deployment--7fcdb87857--9kkwx-eth0" May 17 00:40:41.019371 env[1411]: 2025-05-17 00:40:41.017 [INFO][3341] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:40:41.019371 env[1411]: 2025-05-17 00:40:41.018 [INFO][3334] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab" May 17 00:40:41.020037 env[1411]: time="2025-05-17T00:40:41.019487485Z" level=info msg="TearDown network for sandbox \"c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab\" successfully" May 17 00:40:41.020037 env[1411]: time="2025-05-17T00:40:41.019526787Z" level=info msg="StopPodSandbox for \"c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab\" returns successfully" May 17 00:40:41.020167 env[1411]: time="2025-05-17T00:40:41.020136517Z" level=info msg="RemovePodSandbox for \"c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab\"" May 17 00:40:41.020220 env[1411]: time="2025-05-17T00:40:41.020171219Z" level=info msg="Forcibly stopping sandbox \"c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab\"" May 17 00:40:41.113486 env[1411]: 2025-05-17 00:40:41.064 [WARNING][3357] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.18-k8s-nginx--deployment--7fcdb87857--9kkwx-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"9f88e28f-2a3c-4227-88be-aeaa28287898", ResourceVersion:"1655", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 40, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.18", ContainerID:"cb78e895e4bf99d07358472dc9154532fd60e24e9a115abd3747e8b590c43856", Pod:"nginx-deployment-7fcdb87857-9kkwx", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.76.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calia7ffd5f8aff", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:40:41.113486 env[1411]: 2025-05-17 00:40:41.064 [INFO][3357] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab" May 17 00:40:41.113486 env[1411]: 2025-05-17 00:40:41.064 [INFO][3357] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab" iface="eth0" netns="" May 17 00:40:41.113486 env[1411]: 2025-05-17 00:40:41.064 [INFO][3357] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab" May 17 00:40:41.113486 env[1411]: 2025-05-17 00:40:41.064 [INFO][3357] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab" May 17 00:40:41.113486 env[1411]: 2025-05-17 00:40:41.089 [INFO][3364] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab" HandleID="k8s-pod-network.c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab" Workload="10.200.4.18-k8s-nginx--deployment--7fcdb87857--9kkwx-eth0" May 17 00:40:41.113486 env[1411]: 2025-05-17 00:40:41.089 [INFO][3364] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:40:41.113486 env[1411]: 2025-05-17 00:40:41.089 [INFO][3364] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:40:41.113486 env[1411]: 2025-05-17 00:40:41.105 [WARNING][3364] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab" HandleID="k8s-pod-network.c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab" Workload="10.200.4.18-k8s-nginx--deployment--7fcdb87857--9kkwx-eth0" May 17 00:40:41.113486 env[1411]: 2025-05-17 00:40:41.105 [INFO][3364] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab" HandleID="k8s-pod-network.c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab" Workload="10.200.4.18-k8s-nginx--deployment--7fcdb87857--9kkwx-eth0" May 17 00:40:41.113486 env[1411]: 2025-05-17 00:40:41.111 [INFO][3364] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:40:41.113486 env[1411]: 2025-05-17 00:40:41.112 [INFO][3357] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab" May 17 00:40:41.114197 env[1411]: time="2025-05-17T00:40:41.113533637Z" level=info msg="TearDown network for sandbox \"c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab\" successfully" May 17 00:40:41.132724 env[1411]: time="2025-05-17T00:40:41.132662383Z" level=info msg="RemovePodSandbox \"c188c0895ac7eeb3c384a72de32ee1b3bc57c6dbdfdee030a99017e3e6d58dab\" returns successfully" May 17 00:40:41.133353 env[1411]: time="2025-05-17T00:40:41.133315916Z" level=info msg="StopPodSandbox for \"d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e\"" May 17 00:40:41.207053 env[1411]: 2025-05-17 00:40:41.170 [WARNING][3378] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.18-k8s-csi--node--driver--nt72n-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5c6f2d45-a691-4f43-862c-1793e0fd6dbb", ResourceVersion:"1638", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 39, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.18", ContainerID:"d0a21a9dab935f68a6542fe2a322644e8c53862ba482787fc312d5dfa969a953", Pod:"csi-node-driver-nt72n", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.76.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali4f3fa026604", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:40:41.207053 env[1411]: 2025-05-17 00:40:41.171 [INFO][3378] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e" May 17 00:40:41.207053 env[1411]: 2025-05-17 00:40:41.171 [INFO][3378] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e" iface="eth0" netns="" May 17 00:40:41.207053 env[1411]: 2025-05-17 00:40:41.171 [INFO][3378] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e" May 17 00:40:41.207053 env[1411]: 2025-05-17 00:40:41.171 [INFO][3378] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e" May 17 00:40:41.207053 env[1411]: 2025-05-17 00:40:41.193 [INFO][3385] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e" HandleID="k8s-pod-network.d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e" Workload="10.200.4.18-k8s-csi--node--driver--nt72n-eth0" May 17 00:40:41.207053 env[1411]: 2025-05-17 00:40:41.193 [INFO][3385] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:40:41.207053 env[1411]: 2025-05-17 00:40:41.193 [INFO][3385] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:40:41.207053 env[1411]: 2025-05-17 00:40:41.201 [WARNING][3385] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e" HandleID="k8s-pod-network.d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e" Workload="10.200.4.18-k8s-csi--node--driver--nt72n-eth0" May 17 00:40:41.207053 env[1411]: 2025-05-17 00:40:41.201 [INFO][3385] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e" HandleID="k8s-pod-network.d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e" Workload="10.200.4.18-k8s-csi--node--driver--nt72n-eth0" May 17 00:40:41.207053 env[1411]: 2025-05-17 00:40:41.203 [INFO][3385] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:40:41.207053 env[1411]: 2025-05-17 00:40:41.204 [INFO][3378] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e" May 17 00:40:41.207053 env[1411]: time="2025-05-17T00:40:41.205964109Z" level=info msg="TearDown network for sandbox \"d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e\" successfully" May 17 00:40:41.207053 env[1411]: time="2025-05-17T00:40:41.206001911Z" level=info msg="StopPodSandbox for \"d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e\" returns successfully" May 17 00:40:41.207869 env[1411]: time="2025-05-17T00:40:41.207454783Z" level=info msg="RemovePodSandbox for \"d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e\"" May 17 00:40:41.207869 env[1411]: time="2025-05-17T00:40:41.207501385Z" level=info msg="Forcibly stopping sandbox \"d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e\"" May 17 00:40:41.271106 env[1411]: 2025-05-17 00:40:41.239 [WARNING][3399] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.18-k8s-csi--node--driver--nt72n-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5c6f2d45-a691-4f43-862c-1793e0fd6dbb", ResourceVersion:"1638", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 39, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.18", ContainerID:"d0a21a9dab935f68a6542fe2a322644e8c53862ba482787fc312d5dfa969a953", Pod:"csi-node-driver-nt72n", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.76.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali4f3fa026604", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:40:41.271106 env[1411]: 2025-05-17 00:40:41.240 [INFO][3399] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e" May 17 00:40:41.271106 env[1411]: 2025-05-17 00:40:41.240 [INFO][3399] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e" iface="eth0" netns="" May 17 00:40:41.271106 env[1411]: 2025-05-17 00:40:41.240 [INFO][3399] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e" May 17 00:40:41.271106 env[1411]: 2025-05-17 00:40:41.240 [INFO][3399] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e" May 17 00:40:41.271106 env[1411]: 2025-05-17 00:40:41.261 [INFO][3406] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e" HandleID="k8s-pod-network.d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e" Workload="10.200.4.18-k8s-csi--node--driver--nt72n-eth0" May 17 00:40:41.271106 env[1411]: 2025-05-17 00:40:41.261 [INFO][3406] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:40:41.271106 env[1411]: 2025-05-17 00:40:41.261 [INFO][3406] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:40:41.271106 env[1411]: 2025-05-17 00:40:41.267 [WARNING][3406] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e" HandleID="k8s-pod-network.d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e" Workload="10.200.4.18-k8s-csi--node--driver--nt72n-eth0" May 17 00:40:41.271106 env[1411]: 2025-05-17 00:40:41.267 [INFO][3406] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e" HandleID="k8s-pod-network.d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e" Workload="10.200.4.18-k8s-csi--node--driver--nt72n-eth0" May 17 00:40:41.271106 env[1411]: 2025-05-17 00:40:41.268 [INFO][3406] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:40:41.271106 env[1411]: 2025-05-17 00:40:41.270 [INFO][3399] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e" May 17 00:40:41.271817 env[1411]: time="2025-05-17T00:40:41.271101232Z" level=info msg="TearDown network for sandbox \"d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e\" successfully" May 17 00:40:41.282653 env[1411]: time="2025-05-17T00:40:41.282591800Z" level=info msg="RemovePodSandbox \"d80b4d5a8b33db651b28fff5ec92813f099bb5d7fd7ae82de70a0fd79599216e\" returns successfully" May 17 00:40:41.956495 kubelet[1859]: E0517 00:40:41.956434 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:42.957122 kubelet[1859]: E0517 00:40:42.957077 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:43.957720 kubelet[1859]: E0517 00:40:43.957660 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:44.958027 kubelet[1859]: E0517 00:40:44.957963 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:45.959084 kubelet[1859]: E0517 00:40:45.959028 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:46.959804 kubelet[1859]: E0517 00:40:46.959735 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:47.960214 kubelet[1859]: E0517 00:40:47.960144 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:48.960358 kubelet[1859]: E0517 00:40:48.960289 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:49.961272 kubelet[1859]: E0517 00:40:49.961206 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:50.962152 kubelet[1859]: E0517 00:40:50.962082 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:51.963096 kubelet[1859]: E0517 00:40:51.963036 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:52.963470 kubelet[1859]: E0517 00:40:52.963402 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:53.964107 kubelet[1859]: E0517 00:40:53.964048 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:54.964744 kubelet[1859]: E0517 00:40:54.964678 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:55.965665 kubelet[1859]: E0517 00:40:55.965609 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:56.966281 kubelet[1859]: E0517 00:40:56.966227 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:57.966952 kubelet[1859]: E0517 00:40:57.966890 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:58.967768 kubelet[1859]: E0517 00:40:58.967718 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:59.968918 kubelet[1859]: E0517 00:40:59.968853 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:00.911954 kubelet[1859]: E0517 00:41:00.911890 1859 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:00.969683 kubelet[1859]: E0517 00:41:00.969632 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:01.970227 kubelet[1859]: E0517 00:41:01.970159 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:02.970970 kubelet[1859]: E0517 00:41:02.970902 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:03.365933 systemd[1]: Created slice kubepods-besteffort-pod19817ab8_a72a_4b23_bbc9_27f917f0eb4e.slice. May 17 00:41:03.482148 kubelet[1859]: I0517 00:41:03.482090 1859 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-a1f5fed9-1beb-4b5f-a851-3ad3abcf89fb\" (UniqueName: \"kubernetes.io/nfs/19817ab8-a72a-4b23-bbc9-27f917f0eb4e-pvc-a1f5fed9-1beb-4b5f-a851-3ad3abcf89fb\") pod \"test-pod-1\" (UID: \"19817ab8-a72a-4b23-bbc9-27f917f0eb4e\") " pod="default/test-pod-1" May 17 00:41:03.482503 kubelet[1859]: I0517 00:41:03.482461 1859 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6r7d8\" (UniqueName: \"kubernetes.io/projected/19817ab8-a72a-4b23-bbc9-27f917f0eb4e-kube-api-access-6r7d8\") pod \"test-pod-1\" (UID: \"19817ab8-a72a-4b23-bbc9-27f917f0eb4e\") " pod="default/test-pod-1" May 17 00:41:03.692126 kernel: Failed to create system directory netfs May 17 00:41:03.692302 kernel: kauditd_printk_skb: 68 callbacks suppressed May 17 00:41:03.692339 kernel: audit: type=1400 audit(1747442463.685:762): avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:03.685000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:03.710653 kernel: Failed to create system directory netfs May 17 00:41:03.710781 kernel: audit: type=1400 audit(1747442463.685:762): avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:03.685000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:03.729183 kernel: Failed to create system directory netfs May 17 00:41:03.729318 kernel: audit: type=1400 audit(1747442463.685:762): avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:03.685000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:03.746800 kernel: Failed to create system directory netfs May 17 00:41:03.746933 kernel: audit: type=1400 audit(1747442463.685:762): avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:03.685000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:03.685000 audit[3446]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55d0095a55e0 a1=153bc a2=55cfd957c2b0 a3=5 items=0 ppid=9 pid=3446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:03.795451 kernel: audit: type=1300 audit(1747442463.685:762): arch=c000003e syscall=175 success=yes exit=0 a0=55d0095a55e0 a1=153bc a2=55cfd957c2b0 a3=5 items=0 ppid=9 pid=3446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:03.795609 kernel: audit: type=1327 audit(1747442463.685:762): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 17 00:41:03.795639 kernel: Failed to create system directory fscache May 17 00:41:03.795665 kernel: audit: type=1400 audit(1747442463.784:763): avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:03.685000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 17 00:41:03.784000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:03.814885 kernel: Failed to create system directory fscache May 17 00:41:03.815034 kernel: audit: type=1400 audit(1747442463.784:763): avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:03.784000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:03.833006 kernel: Failed to create system directory fscache May 17 00:41:03.833134 kernel: audit: type=1400 audit(1747442463.784:763): avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:03.784000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:03.851008 kernel: Failed to create system directory fscache May 17 00:41:03.851144 kernel: audit: type=1400 audit(1747442463.784:763): avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:03.784000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:03.869143 kernel: Failed to create system directory fscache May 17 00:41:03.784000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:03.784000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:03.869599 kernel: Failed to create system directory fscache May 17 00:41:03.784000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:03.873589 kernel: Failed to create system directory fscache May 17 00:41:03.784000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:03.877649 kernel: Failed to create system directory fscache May 17 00:41:03.784000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:03.784000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:03.886905 kernel: Failed to create system directory fscache May 17 00:41:03.887004 kernel: Failed to create system directory fscache May 17 00:41:03.887029 kernel: Failed to create system directory fscache May 17 00:41:03.784000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:03.784000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:03.892962 kernel: Failed to create system directory fscache May 17 00:41:03.893052 kernel: Failed to create system directory fscache May 17 00:41:03.784000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:03.784000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:03.898929 kernel: Failed to create system directory fscache May 17 00:41:03.902599 kernel: FS-Cache: Loaded May 17 00:41:03.784000 audit[3446]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55d0097ba9c0 a1=4c0fc a2=55cfd957c2b0 a3=5 items=0 ppid=9 pid=3446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:03.784000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 17 00:41:03.972214 kubelet[1859]: E0517 00:41:03.972045 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.030815 kernel: Failed to create system directory sunrpc May 17 00:41:04.030926 kernel: Failed to create system directory sunrpc May 17 00:41:04.030951 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.036812 kernel: Failed to create system directory sunrpc May 17 00:41:04.036911 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.044240 kernel: Failed to create system directory sunrpc May 17 00:41:04.044334 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.050193 kernel: Failed to create system directory sunrpc May 17 00:41:04.050278 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.055948 kernel: Failed to create system directory sunrpc May 17 00:41:04.056020 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.062006 kernel: Failed to create system directory sunrpc May 17 00:41:04.062089 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.067429 kernel: Failed to create system directory sunrpc May 17 00:41:04.067515 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.073427 kernel: Failed to create system directory sunrpc May 17 00:41:04.073512 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.077064 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.081843 kernel: Failed to create system directory sunrpc May 17 00:41:04.081919 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.084864 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.090132 kernel: Failed to create system directory sunrpc May 17 00:41:04.090220 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.095488 kernel: Failed to create system directory sunrpc May 17 00:41:04.095551 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.100604 kernel: Failed to create system directory sunrpc May 17 00:41:04.100690 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.105311 kernel: Failed to create system directory sunrpc May 17 00:41:04.105388 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.111448 kernel: Failed to create system directory sunrpc May 17 00:41:04.111586 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.118488 kernel: Failed to create system directory sunrpc May 17 00:41:04.118610 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.125270 kernel: Failed to create system directory sunrpc May 17 00:41:04.125649 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.132072 kernel: Failed to create system directory sunrpc May 17 00:41:04.132914 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.136719 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.141909 kernel: Failed to create system directory sunrpc May 17 00:41:04.143007 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.149013 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.152613 kernel: Failed to create system directory sunrpc May 17 00:41:04.152730 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.159464 kernel: Failed to create system directory sunrpc May 17 00:41:04.159595 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.162816 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.166242 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.173024 kernel: Failed to create system directory sunrpc May 17 00:41:04.173157 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.178182 kernel: Failed to create system directory sunrpc May 17 00:41:04.178281 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.183383 kernel: Failed to create system directory sunrpc May 17 00:41:04.183486 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.190821 kernel: Failed to create system directory sunrpc May 17 00:41:04.191401 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.193056 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.198085 kernel: Failed to create system directory sunrpc May 17 00:41:04.198176 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.202801 kernel: Failed to create system directory sunrpc May 17 00:41:04.202880 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.207501 kernel: Failed to create system directory sunrpc May 17 00:41:04.207595 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.211237 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.214617 kernel: Failed to create system directory sunrpc May 17 00:41:04.214685 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.216952 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.221644 kernel: Failed to create system directory sunrpc May 17 00:41:04.221722 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.224080 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.226741 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.230899 kernel: Failed to create system directory sunrpc May 17 00:41:04.230961 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.235938 kernel: Failed to create system directory sunrpc May 17 00:41:04.236723 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.238619 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.243086 kernel: Failed to create system directory sunrpc May 17 00:41:04.243151 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.247692 kernel: Failed to create system directory sunrpc May 17 00:41:04.247757 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.252657 kernel: Failed to create system directory sunrpc May 17 00:41:04.252731 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.258788 kernel: Failed to create system directory sunrpc May 17 00:41:04.258870 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.265280 kernel: Failed to create system directory sunrpc May 17 00:41:04.265415 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.272745 kernel: Failed to create system directory sunrpc May 17 00:41:04.272827 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.278882 kernel: Failed to create system directory sunrpc May 17 00:41:04.278963 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.285468 kernel: Failed to create system directory sunrpc May 17 00:41:04.285550 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.291551 kernel: Failed to create system directory sunrpc May 17 00:41:04.291654 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.297196 kernel: Failed to create system directory sunrpc May 17 00:41:04.297289 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.303680 kernel: Failed to create system directory sunrpc May 17 00:41:04.303767 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.310608 kernel: Failed to create system directory sunrpc May 17 00:41:04.310666 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.318729 kernel: Failed to create system directory sunrpc May 17 00:41:04.318841 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.321613 kernel: Failed to create system directory sunrpc May 17 00:41:04.324700 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.329539 kernel: Failed to create system directory sunrpc May 17 00:41:04.329652 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.334122 kernel: Failed to create system directory sunrpc May 17 00:41:04.334196 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.340713 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.341601 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.348018 kernel: Failed to create system directory sunrpc May 17 00:41:04.348071 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.354429 kernel: Failed to create system directory sunrpc May 17 00:41:04.354477 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.360943 kernel: Failed to create system directory sunrpc May 17 00:41:04.361116 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.366629 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.372252 kernel: Failed to create system directory sunrpc May 17 00:41:04.372331 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.377490 kernel: Failed to create system directory sunrpc May 17 00:41:04.377592 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.382015 kernel: Failed to create system directory sunrpc May 17 00:41:04.382081 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.386702 kernel: Failed to create system directory sunrpc May 17 00:41:04.386774 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.391334 kernel: Failed to create system directory sunrpc May 17 00:41:04.391400 kernel: Failed to create system directory sunrpc May 17 00:41:04.011000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.406235 kernel: RPC: Registered named UNIX socket transport module. May 17 00:41:04.406364 kernel: RPC: Registered udp transport module. May 17 00:41:04.406392 kernel: RPC: Registered tcp transport module. May 17 00:41:04.408504 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. May 17 00:41:04.011000 audit[3446]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55d009806ad0 a1=1a814c a2=55cfd957c2b0 a3=5 items=6 ppid=9 pid=3446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:04.011000 audit: CWD cwd="/" May 17 00:41:04.011000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:04.011000 audit: PATH item=1 name=(null) inode=26894 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:04.011000 audit: PATH item=2 name=(null) inode=26894 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:04.011000 audit: PATH item=3 name=(null) inode=26895 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:04.011000 audit: PATH item=4 name=(null) inode=26894 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:04.011000 audit: PATH item=5 name=(null) inode=26896 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:04.011000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.548161 kernel: Failed to create system directory nfs May 17 00:41:04.548245 kernel: Failed to create system directory nfs May 17 00:41:04.548277 kernel: Failed to create system directory nfs May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.550656 kernel: Failed to create system directory nfs May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.555399 kernel: Failed to create system directory nfs May 17 00:41:04.555475 kernel: Failed to create system directory nfs May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.557643 kernel: Failed to create system directory nfs May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.562121 kernel: Failed to create system directory nfs May 17 00:41:04.562180 kernel: Failed to create system directory nfs May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.566657 kernel: Failed to create system directory nfs May 17 00:41:04.566735 kernel: Failed to create system directory nfs May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.571120 kernel: Failed to create system directory nfs May 17 00:41:04.571201 kernel: Failed to create system directory nfs May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.575484 kernel: Failed to create system directory nfs May 17 00:41:04.575602 kernel: Failed to create system directory nfs May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.580433 kernel: Failed to create system directory nfs May 17 00:41:04.580533 kernel: Failed to create system directory nfs May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.584963 kernel: Failed to create system directory nfs May 17 00:41:04.585043 kernel: Failed to create system directory nfs May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.589548 kernel: Failed to create system directory nfs May 17 00:41:04.589626 kernel: Failed to create system directory nfs May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.593933 kernel: Failed to create system directory nfs May 17 00:41:04.593990 kernel: Failed to create system directory nfs May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.598507 kernel: Failed to create system directory nfs May 17 00:41:04.598583 kernel: Failed to create system directory nfs May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.604838 kernel: Failed to create system directory nfs May 17 00:41:04.604898 kernel: Failed to create system directory nfs May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.607377 kernel: Failed to create system directory nfs May 17 00:41:04.607448 kernel: Failed to create system directory nfs May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.611648 kernel: Failed to create system directory nfs May 17 00:41:04.611716 kernel: Failed to create system directory nfs May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.616072 kernel: Failed to create system directory nfs May 17 00:41:04.616143 kernel: Failed to create system directory nfs May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.620593 kernel: Failed to create system directory nfs May 17 00:41:04.620640 kernel: Failed to create system directory nfs May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.624787 kernel: Failed to create system directory nfs May 17 00:41:04.624862 kernel: Failed to create system directory nfs May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.629333 kernel: Failed to create system directory nfs May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.634479 kernel: Failed to create system directory nfs May 17 00:41:04.634555 kernel: Failed to create system directory nfs May 17 00:41:04.634598 kernel: Failed to create system directory nfs May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.639172 kernel: Failed to create system directory nfs May 17 00:41:04.639231 kernel: Failed to create system directory nfs May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.643460 kernel: Failed to create system directory nfs May 17 00:41:04.643517 kernel: Failed to create system directory nfs May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.648085 kernel: Failed to create system directory nfs May 17 00:41:04.648167 kernel: Failed to create system directory nfs May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.652343 kernel: Failed to create system directory nfs May 17 00:41:04.652407 kernel: Failed to create system directory nfs May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.656693 kernel: Failed to create system directory nfs May 17 00:41:04.656760 kernel: Failed to create system directory nfs May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.661907 kernel: Failed to create system directory nfs May 17 00:41:04.661980 kernel: Failed to create system directory nfs May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.666258 kernel: Failed to create system directory nfs May 17 00:41:04.666330 kernel: Failed to create system directory nfs May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.670557 kernel: Failed to create system directory nfs May 17 00:41:04.670616 kernel: Failed to create system directory nfs May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.672635 kernel: Failed to create system directory nfs May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.677151 kernel: Failed to create system directory nfs May 17 00:41:04.677211 kernel: Failed to create system directory nfs May 17 00:41:04.532000 audit[3446]: AVC avc: denied { confidentiality } for pid=3446 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.532000 audit[3446]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55d009a27a10 a1=16eae4 a2=55cfd957c2b0 a3=5 items=0 ppid=9 pid=3446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:04.701886 kernel: FS-Cache: Netfs 'nfs' registered for caching May 17 00:41:04.532000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.767782 kernel: Failed to create system directory nfs4 May 17 00:41:04.767870 kernel: Failed to create system directory nfs4 May 17 00:41:04.767898 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.772283 kernel: Failed to create system directory nfs4 May 17 00:41:04.772347 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.774636 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.779832 kernel: Failed to create system directory nfs4 May 17 00:41:04.779890 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.784177 kernel: Failed to create system directory nfs4 May 17 00:41:04.784237 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.788714 kernel: Failed to create system directory nfs4 May 17 00:41:04.788781 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.792964 kernel: Failed to create system directory nfs4 May 17 00:41:04.793020 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.795907 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.799591 kernel: Failed to create system directory nfs4 May 17 00:41:04.799659 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.801725 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.804178 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.806418 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.808670 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.810788 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.813318 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.815204 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.817538 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.819910 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.822140 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.824262 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.826401 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.828677 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.830827 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.832981 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.835512 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.837673 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.840010 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.842077 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.844330 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.846632 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.848828 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.851140 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.853283 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.855457 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.857686 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.859992 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.862151 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.865018 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.867625 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.871301 kernel: Failed to create system directory nfs4 May 17 00:41:04.871344 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.873423 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.875881 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.878588 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.882714 kernel: Failed to create system directory nfs4 May 17 00:41:04.882774 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.887065 kernel: Failed to create system directory nfs4 May 17 00:41:04.887135 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.891425 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.893792 kernel: Failed to create system directory nfs4 May 17 00:41:04.893848 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.898245 kernel: Failed to create system directory nfs4 May 17 00:41:04.898320 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.902546 kernel: Failed to create system directory nfs4 May 17 00:41:04.902621 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.906943 kernel: Failed to create system directory nfs4 May 17 00:41:04.907023 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.911443 kernel: Failed to create system directory nfs4 May 17 00:41:04.911518 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.915841 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.918646 kernel: Failed to create system directory nfs4 May 17 00:41:04.918722 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.923112 kernel: Failed to create system directory nfs4 May 17 00:41:04.923173 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.927519 kernel: Failed to create system directory nfs4 May 17 00:41:04.927594 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.931998 kernel: Failed to create system directory nfs4 May 17 00:41:04.932082 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.936619 kernel: Failed to create system directory nfs4 May 17 00:41:04.936699 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.941068 kernel: Failed to create system directory nfs4 May 17 00:41:04.941141 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.945777 kernel: Failed to create system directory nfs4 May 17 00:41:04.945855 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.950220 kernel: Failed to create system directory nfs4 May 17 00:41:04.950286 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.954521 kernel: Failed to create system directory nfs4 May 17 00:41:04.954584 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.958833 kernel: Failed to create system directory nfs4 May 17 00:41:04.958884 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.963310 kernel: Failed to create system directory nfs4 May 17 00:41:04.963359 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.967487 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.970622 kernel: Failed to create system directory nfs4 May 17 00:41:04.970672 kernel: Failed to create system directory nfs4 May 17 00:41:04.747000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:04.972853 kubelet[1859]: E0517 00:41:04.972788 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:04.974170 kernel: Failed to create system directory nfs4 May 17 00:41:05.114353 kernel: NFS: Registering the id_resolver key type May 17 00:41:05.114511 kernel: Key type id_resolver registered May 17 00:41:05.114534 kernel: Key type id_legacy registered May 17 00:41:04.747000 audit[3452]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f7b4caad010 a1=209404 a2=560d130fc2b0 a3=5 items=0 ppid=9 pid=3452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:04.747000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 May 17 00:41:05.160000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:05.160000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:05.169267 kernel: Failed to create system directory rpcgss May 17 00:41:05.169371 kernel: Failed to create system directory rpcgss May 17 00:41:05.169395 kernel: Failed to create system directory rpcgss May 17 00:41:05.160000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:05.160000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:05.174102 kernel: Failed to create system directory rpcgss May 17 00:41:05.174166 kernel: Failed to create system directory rpcgss May 17 00:41:05.160000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:05.160000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:05.178578 kernel: Failed to create system directory rpcgss May 17 00:41:05.178636 kernel: Failed to create system directory rpcgss May 17 00:41:05.160000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:05.160000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:05.183556 kernel: Failed to create system directory rpcgss May 17 00:41:05.183636 kernel: Failed to create system directory rpcgss May 17 00:41:05.160000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:05.160000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:05.188194 kernel: Failed to create system directory rpcgss May 17 00:41:05.188257 kernel: Failed to create system directory rpcgss May 17 00:41:05.160000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:05.160000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:05.193111 kernel: Failed to create system directory rpcgss May 17 00:41:05.193167 kernel: Failed to create system directory rpcgss May 17 00:41:05.160000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:05.160000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:05.197966 kernel: Failed to create system directory rpcgss May 17 00:41:05.198040 kernel: Failed to create system directory rpcgss May 17 00:41:05.160000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:05.160000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:05.202427 kernel: Failed to create system directory rpcgss May 17 00:41:05.202492 kernel: Failed to create system directory rpcgss May 17 00:41:05.160000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:05.160000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:05.207213 kernel: Failed to create system directory rpcgss May 17 00:41:05.207278 kernel: Failed to create system directory rpcgss May 17 00:41:05.160000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:05.160000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:05.212149 kernel: Failed to create system directory rpcgss May 17 00:41:05.212247 kernel: Failed to create system directory rpcgss May 17 00:41:05.160000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:05.160000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:05.216739 kernel: Failed to create system directory rpcgss May 17 00:41:05.160000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:05.219676 kernel: Failed to create system directory rpcgss May 17 00:41:05.219747 kernel: Failed to create system directory rpcgss May 17 00:41:05.160000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:05.160000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:05.224230 kernel: Failed to create system directory rpcgss May 17 00:41:05.224304 kernel: Failed to create system directory rpcgss May 17 00:41:05.160000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:05.160000 audit[3453]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f72eb58b010 a1=70b64 a2=5599f78a72b0 a3=5 items=0 ppid=9 pid=3453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:05.160000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 May 17 00:41:05.409411 nfsidmap[3460]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.7-n-332dbccb2e' May 17 00:41:05.423634 nfsidmap[3461]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.7-n-332dbccb2e' May 17 00:41:05.434000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2883 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:41:05.434000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2883 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:41:05.434000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2883 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:41:05.434000 audit[1521]: AVC avc: denied { watch_reads } for pid=1521 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2883 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:41:05.434000 audit[1521]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55f4ceee05c0 a2=10 a3=5e988323e5266403 items=0 ppid=1 pid=1521 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:05.434000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 17 00:41:05.435000 audit[1521]: AVC avc: denied { watch_reads } for pid=1521 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2883 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:41:05.435000 audit[1521]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55f4ceee05c0 a2=10 a3=5e988323e5266403 items=0 ppid=1 pid=1521 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:05.435000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 17 00:41:05.435000 audit[1521]: AVC avc: denied { watch_reads } for pid=1521 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2883 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:41:05.435000 audit[1521]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55f4ceee05c0 a2=10 a3=5e988323e5266403 items=0 ppid=1 pid=1521 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:05.435000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 17 00:41:05.469890 env[1411]: time="2025-05-17T00:41:05.469817461Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:19817ab8-a72a-4b23-bbc9-27f917f0eb4e,Namespace:default,Attempt:0,}" May 17 00:41:05.610534 systemd-networkd[1562]: cali5ec59c6bf6e: Link UP May 17 00:41:05.618863 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:41:05.618992 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready May 17 00:41:05.622856 systemd-networkd[1562]: cali5ec59c6bf6e: Gained carrier May 17 00:41:05.637592 env[1411]: 2025-05-17 00:41:05.540 [INFO][3463] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.4.18-k8s-test--pod--1-eth0 default 19817ab8-a72a-4b23-bbc9-27f917f0eb4e 1801 0 2025-05-17 00:40:32 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.4.18 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="3c6e270ee753b95c47a24cffc34c26939b932008c67078b0823871850046238f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.4.18-k8s-test--pod--1-" May 17 00:41:05.637592 env[1411]: 2025-05-17 00:41:05.540 [INFO][3463] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="3c6e270ee753b95c47a24cffc34c26939b932008c67078b0823871850046238f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.4.18-k8s-test--pod--1-eth0" May 17 00:41:05.637592 env[1411]: 2025-05-17 00:41:05.566 [INFO][3476] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3c6e270ee753b95c47a24cffc34c26939b932008c67078b0823871850046238f" HandleID="k8s-pod-network.3c6e270ee753b95c47a24cffc34c26939b932008c67078b0823871850046238f" Workload="10.200.4.18-k8s-test--pod--1-eth0" May 17 00:41:05.637592 env[1411]: 2025-05-17 00:41:05.566 [INFO][3476] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="3c6e270ee753b95c47a24cffc34c26939b932008c67078b0823871850046238f" HandleID="k8s-pod-network.3c6e270ee753b95c47a24cffc34c26939b932008c67078b0823871850046238f" Workload="10.200.4.18-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002356c0), Attrs:map[string]string{"namespace":"default", "node":"10.200.4.18", "pod":"test-pod-1", "timestamp":"2025-05-17 00:41:05.56646296 +0000 UTC"}, Hostname:"10.200.4.18", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:41:05.637592 env[1411]: 2025-05-17 00:41:05.568 [INFO][3476] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:41:05.637592 env[1411]: 2025-05-17 00:41:05.568 [INFO][3476] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:41:05.637592 env[1411]: 2025-05-17 00:41:05.569 [INFO][3476] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.4.18' May 17 00:41:05.637592 env[1411]: 2025-05-17 00:41:05.576 [INFO][3476] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.3c6e270ee753b95c47a24cffc34c26939b932008c67078b0823871850046238f" host="10.200.4.18" May 17 00:41:05.637592 env[1411]: 2025-05-17 00:41:05.580 [INFO][3476] ipam/ipam.go 394: Looking up existing affinities for host host="10.200.4.18" May 17 00:41:05.637592 env[1411]: 2025-05-17 00:41:05.584 [INFO][3476] ipam/ipam.go 511: Trying affinity for 192.168.76.64/26 host="10.200.4.18" May 17 00:41:05.637592 env[1411]: 2025-05-17 00:41:05.586 [INFO][3476] ipam/ipam.go 158: Attempting to load block cidr=192.168.76.64/26 host="10.200.4.18" May 17 00:41:05.637592 env[1411]: 2025-05-17 00:41:05.588 [INFO][3476] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.76.64/26 host="10.200.4.18" May 17 00:41:05.637592 env[1411]: 2025-05-17 00:41:05.588 [INFO][3476] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.76.64/26 handle="k8s-pod-network.3c6e270ee753b95c47a24cffc34c26939b932008c67078b0823871850046238f" host="10.200.4.18" May 17 00:41:05.637592 env[1411]: 2025-05-17 00:41:05.589 [INFO][3476] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.3c6e270ee753b95c47a24cffc34c26939b932008c67078b0823871850046238f May 17 00:41:05.637592 env[1411]: 2025-05-17 00:41:05.595 [INFO][3476] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.76.64/26 handle="k8s-pod-network.3c6e270ee753b95c47a24cffc34c26939b932008c67078b0823871850046238f" host="10.200.4.18" May 17 00:41:05.637592 env[1411]: 2025-05-17 00:41:05.605 [INFO][3476] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.76.68/26] block=192.168.76.64/26 handle="k8s-pod-network.3c6e270ee753b95c47a24cffc34c26939b932008c67078b0823871850046238f" host="10.200.4.18" May 17 00:41:05.637592 env[1411]: 2025-05-17 00:41:05.605 [INFO][3476] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.76.68/26] handle="k8s-pod-network.3c6e270ee753b95c47a24cffc34c26939b932008c67078b0823871850046238f" host="10.200.4.18" May 17 00:41:05.637592 env[1411]: 2025-05-17 00:41:05.605 [INFO][3476] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:41:05.637592 env[1411]: 2025-05-17 00:41:05.605 [INFO][3476] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.76.68/26] IPv6=[] ContainerID="3c6e270ee753b95c47a24cffc34c26939b932008c67078b0823871850046238f" HandleID="k8s-pod-network.3c6e270ee753b95c47a24cffc34c26939b932008c67078b0823871850046238f" Workload="10.200.4.18-k8s-test--pod--1-eth0" May 17 00:41:05.637592 env[1411]: 2025-05-17 00:41:05.607 [INFO][3463] cni-plugin/k8s.go 418: Populated endpoint ContainerID="3c6e270ee753b95c47a24cffc34c26939b932008c67078b0823871850046238f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.4.18-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.18-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"19817ab8-a72a-4b23-bbc9-27f917f0eb4e", ResourceVersion:"1801", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 40, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.18", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.76.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:41:05.638866 env[1411]: 2025-05-17 00:41:05.607 [INFO][3463] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.76.68/32] ContainerID="3c6e270ee753b95c47a24cffc34c26939b932008c67078b0823871850046238f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.4.18-k8s-test--pod--1-eth0" May 17 00:41:05.638866 env[1411]: 2025-05-17 00:41:05.607 [INFO][3463] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="3c6e270ee753b95c47a24cffc34c26939b932008c67078b0823871850046238f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.4.18-k8s-test--pod--1-eth0" May 17 00:41:05.638866 env[1411]: 2025-05-17 00:41:05.623 [INFO][3463] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="3c6e270ee753b95c47a24cffc34c26939b932008c67078b0823871850046238f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.4.18-k8s-test--pod--1-eth0" May 17 00:41:05.638866 env[1411]: 2025-05-17 00:41:05.624 [INFO][3463] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="3c6e270ee753b95c47a24cffc34c26939b932008c67078b0823871850046238f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.4.18-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.18-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"19817ab8-a72a-4b23-bbc9-27f917f0eb4e", ResourceVersion:"1801", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 40, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.18", ContainerID:"3c6e270ee753b95c47a24cffc34c26939b932008c67078b0823871850046238f", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.76.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"c6:9b:78:c3:d2:bf", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:41:05.638866 env[1411]: 2025-05-17 00:41:05.636 [INFO][3463] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="3c6e270ee753b95c47a24cffc34c26939b932008c67078b0823871850046238f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.4.18-k8s-test--pod--1-eth0" May 17 00:41:05.654000 audit[3490]: NETFILTER_CFG table=filter:81 family=2 entries=40 op=nft_register_chain pid=3490 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:41:05.654000 audit[3490]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffe4a1fd920 a2=0 a3=7ffe4a1fd90c items=0 ppid=2668 pid=3490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:05.654000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:41:05.656188 env[1411]: time="2025-05-17T00:41:05.656065541Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:41:05.656188 env[1411]: time="2025-05-17T00:41:05.656151644Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:41:05.656317 env[1411]: time="2025-05-17T00:41:05.656195745Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:41:05.656420 env[1411]: time="2025-05-17T00:41:05.656373251Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3c6e270ee753b95c47a24cffc34c26939b932008c67078b0823871850046238f pid=3498 runtime=io.containerd.runc.v2 May 17 00:41:05.679076 systemd[1]: Started cri-containerd-3c6e270ee753b95c47a24cffc34c26939b932008c67078b0823871850046238f.scope. May 17 00:41:05.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:05.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:05.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:05.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:05.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:05.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:05.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:05.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:05.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:05.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:05.694000 audit: BPF prog-id=127 op=LOAD May 17 00:41:05.695000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:05.695000 audit[3509]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3498 pid=3509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:05.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363366532373065653735336239356334376132346366666333346332 May 17 00:41:05.695000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:05.695000 audit[3509]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3498 pid=3509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:05.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363366532373065653735336239356334376132346366666333346332 May 17 00:41:05.695000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:05.695000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:05.695000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:05.695000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:05.695000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:05.695000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:05.695000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:05.695000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:05.695000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:05.695000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:05.695000 audit: BPF prog-id=128 op=LOAD May 17 00:41:05.695000 audit[3509]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003d0520 items=0 ppid=3498 pid=3509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:05.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363366532373065653735336239356334376132346366666333346332 May 17 00:41:05.695000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:05.695000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:05.695000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:05.695000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:05.695000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:05.695000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:05.695000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:05.695000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:05.695000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:05.695000 audit: BPF prog-id=129 op=LOAD May 17 00:41:05.695000 audit[3509]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003d0568 items=0 ppid=3498 pid=3509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:05.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363366532373065653735336239356334376132346366666333346332 May 17 00:41:05.695000 audit: BPF prog-id=129 op=UNLOAD May 17 00:41:05.695000 audit: BPF prog-id=128 op=UNLOAD May 17 00:41:05.695000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:05.695000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:05.695000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:05.695000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:05.695000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:05.695000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:05.695000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:05.695000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:05.695000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:05.695000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:05.695000 audit: BPF prog-id=130 op=LOAD May 17 00:41:05.695000 audit[3509]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003d0978 items=0 ppid=3498 pid=3509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:05.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363366532373065653735336239356334376132346366666333346332 May 17 00:41:05.732948 env[1411]: time="2025-05-17T00:41:05.732903126Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:19817ab8-a72a-4b23-bbc9-27f917f0eb4e,Namespace:default,Attempt:0,} returns sandbox id \"3c6e270ee753b95c47a24cffc34c26939b932008c67078b0823871850046238f\"" May 17 00:41:05.734618 env[1411]: time="2025-05-17T00:41:05.734584278Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 17 00:41:05.973509 kubelet[1859]: E0517 00:41:05.973359 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:06.086470 env[1411]: time="2025-05-17T00:41:06.086415155Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:06.094693 env[1411]: time="2025-05-17T00:41:06.094642306Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:06.099751 env[1411]: time="2025-05-17T00:41:06.099699760Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:06.105053 env[1411]: time="2025-05-17T00:41:06.105005122Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:06.105725 env[1411]: time="2025-05-17T00:41:06.105685843Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa\"" May 17 00:41:06.108314 env[1411]: time="2025-05-17T00:41:06.108277522Z" level=info msg="CreateContainer within sandbox \"3c6e270ee753b95c47a24cffc34c26939b932008c67078b0823871850046238f\" for container &ContainerMetadata{Name:test,Attempt:0,}" May 17 00:41:06.136118 env[1411]: time="2025-05-17T00:41:06.136063371Z" level=info msg="CreateContainer within sandbox \"3c6e270ee753b95c47a24cffc34c26939b932008c67078b0823871850046238f\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"7c242189f73fd51222b5f60850fbd2efd36f1a63280913759501df169aca7ad7\"" May 17 00:41:06.136925 env[1411]: time="2025-05-17T00:41:06.136884196Z" level=info msg="StartContainer for \"7c242189f73fd51222b5f60850fbd2efd36f1a63280913759501df169aca7ad7\"" May 17 00:41:06.152866 systemd[1]: Started cri-containerd-7c242189f73fd51222b5f60850fbd2efd36f1a63280913759501df169aca7ad7.scope. May 17 00:41:06.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.170000 audit: BPF prog-id=131 op=LOAD May 17 00:41:06.171000 audit[3541]: AVC avc: denied { bpf } for pid=3541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.171000 audit[3541]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3498 pid=3541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:06.171000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763323432313839663733666435313232326235663630383530666264 May 17 00:41:06.171000 audit[3541]: AVC avc: denied { perfmon } for pid=3541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.171000 audit[3541]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=3498 pid=3541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:06.171000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763323432313839663733666435313232326235663630383530666264 May 17 00:41:06.172000 audit[3541]: AVC avc: denied { bpf } for pid=3541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.172000 audit[3541]: AVC avc: denied { bpf } for pid=3541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.172000 audit[3541]: AVC avc: denied { bpf } for pid=3541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.172000 audit[3541]: AVC avc: denied { perfmon } for pid=3541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.172000 audit[3541]: AVC avc: denied { perfmon } for pid=3541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.172000 audit[3541]: AVC avc: denied { perfmon } for pid=3541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.172000 audit[3541]: AVC avc: denied { perfmon } for pid=3541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.172000 audit[3541]: AVC avc: denied { perfmon } for pid=3541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.172000 audit[3541]: AVC avc: denied { bpf } for pid=3541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.172000 audit[3541]: AVC avc: denied { bpf } for pid=3541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.172000 audit: BPF prog-id=132 op=LOAD May 17 00:41:06.172000 audit[3541]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001dacb0 items=0 ppid=3498 pid=3541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:06.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763323432313839663733666435313232326235663630383530666264 May 17 00:41:06.172000 audit[3541]: AVC avc: denied { bpf } for pid=3541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.172000 audit[3541]: AVC avc: denied { bpf } for pid=3541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.172000 audit[3541]: AVC avc: denied { perfmon } for pid=3541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.172000 audit[3541]: AVC avc: denied { perfmon } for pid=3541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.172000 audit[3541]: AVC avc: denied { perfmon } for pid=3541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.172000 audit[3541]: AVC avc: denied { perfmon } for pid=3541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.172000 audit[3541]: AVC avc: denied { perfmon } for pid=3541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.172000 audit[3541]: AVC avc: denied { bpf } for pid=3541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.172000 audit[3541]: AVC avc: denied { bpf } for pid=3541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.172000 audit: BPF prog-id=133 op=LOAD May 17 00:41:06.172000 audit[3541]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001dacf8 items=0 ppid=3498 pid=3541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:06.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763323432313839663733666435313232326235663630383530666264 May 17 00:41:06.173000 audit: BPF prog-id=133 op=UNLOAD May 17 00:41:06.173000 audit: BPF prog-id=132 op=UNLOAD May 17 00:41:06.173000 audit[3541]: AVC avc: denied { bpf } for pid=3541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.173000 audit[3541]: AVC avc: denied { bpf } for pid=3541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.173000 audit[3541]: AVC avc: denied { bpf } for pid=3541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.173000 audit[3541]: AVC avc: denied { perfmon } for pid=3541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.173000 audit[3541]: AVC avc: denied { perfmon } for pid=3541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.173000 audit[3541]: AVC avc: denied { perfmon } for pid=3541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.173000 audit[3541]: AVC avc: denied { perfmon } for pid=3541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.173000 audit[3541]: AVC avc: denied { perfmon } for pid=3541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.173000 audit[3541]: AVC avc: denied { bpf } for pid=3541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.173000 audit[3541]: AVC avc: denied { bpf } for pid=3541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:06.173000 audit: BPF prog-id=134 op=LOAD May 17 00:41:06.173000 audit[3541]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0001db108 items=0 ppid=3498 pid=3541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:06.173000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763323432313839663733666435313232326235663630383530666264 May 17 00:41:06.191880 env[1411]: time="2025-05-17T00:41:06.191823673Z" level=info msg="StartContainer for \"7c242189f73fd51222b5f60850fbd2efd36f1a63280913759501df169aca7ad7\" returns successfully" May 17 00:41:06.877879 systemd-networkd[1562]: cali5ec59c6bf6e: Gained IPv6LL May 17 00:41:06.974005 kubelet[1859]: E0517 00:41:06.973941 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:07.974161 kubelet[1859]: E0517 00:41:07.974100 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:08.975066 kubelet[1859]: E0517 00:41:08.975002 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:09.111063 systemd[1]: run-containerd-runc-k8s.io-c96b2900b3d8070e4c3026e5dcdf7e1c6fd309f4a5671a7704edd4e65939a264-runc.Q7iOBR.mount: Deactivated successfully. May 17 00:41:09.975775 kubelet[1859]: E0517 00:41:09.975720 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:10.976537 kubelet[1859]: E0517 00:41:10.976476 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:11.977273 kubelet[1859]: E0517 00:41:11.977216 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:12.977716 kubelet[1859]: E0517 00:41:12.977657 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:13.978511 kubelet[1859]: E0517 00:41:13.978462 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:14.979477 kubelet[1859]: E0517 00:41:14.979412 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:15.979688 kubelet[1859]: E0517 00:41:15.979624 1859 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"