May 17 00:35:55.036057 kernel: Linux version 5.15.182-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri May 16 23:09:52 -00 2025 May 17 00:35:55.036088 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:35:55.036102 kernel: BIOS-provided physical RAM map: May 17 00:35:55.036112 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable May 17 00:35:55.036122 kernel: BIOS-e820: [mem 0x00000000000c0000-0x00000000000fffff] reserved May 17 00:35:55.036132 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003ff40fff] usable May 17 00:35:55.036147 kernel: BIOS-e820: [mem 0x000000003ff41000-0x000000003ffc8fff] reserved May 17 00:35:55.036158 kernel: BIOS-e820: [mem 0x000000003ffc9000-0x000000003fffafff] ACPI data May 17 00:35:55.036169 kernel: BIOS-e820: [mem 0x000000003fffb000-0x000000003fffefff] ACPI NVS May 17 00:35:55.036179 kernel: BIOS-e820: [mem 0x000000003ffff000-0x000000003fffffff] usable May 17 00:35:55.036190 kernel: BIOS-e820: [mem 0x0000000100000000-0x00000002bfffffff] usable May 17 00:35:55.036200 kernel: printk: bootconsole [earlyser0] enabled May 17 00:35:55.036210 kernel: NX (Execute Disable) protection: active May 17 00:35:55.036221 kernel: efi: EFI v2.70 by Microsoft May 17 00:35:55.036237 kernel: efi: ACPI=0x3fffa000 ACPI 2.0=0x3fffa014 SMBIOS=0x3ff85000 SMBIOS 3.0=0x3ff83000 MEMATTR=0x3f5c8a98 RNG=0x3ffd1018 May 17 00:35:55.036249 kernel: random: crng init done May 17 00:35:55.036260 kernel: SMBIOS 3.1.0 present. May 17 00:35:55.036272 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 03/08/2024 May 17 00:35:55.036283 kernel: Hypervisor detected: Microsoft Hyper-V May 17 00:35:55.036294 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3b8030, hints 0x64e24, misc 0xbed7b2 May 17 00:35:55.036306 kernel: Hyper-V Host Build:20348-10.0-1-0.1827 May 17 00:35:55.036317 kernel: Hyper-V: Nested features: 0x1e0101 May 17 00:35:55.036331 kernel: Hyper-V: LAPIC Timer Frequency: 0x30d40 May 17 00:35:55.036342 kernel: Hyper-V: Using hypercall for remote TLB flush May 17 00:35:55.036354 kernel: clocksource: hyperv_clocksource_tsc_page: mask: 0xffffffffffffffff max_cycles: 0x24e6a1710, max_idle_ns: 440795202120 ns May 17 00:35:55.036366 kernel: tsc: Marking TSC unstable due to running on Hyper-V May 17 00:35:55.036378 kernel: tsc: Detected 2593.905 MHz processor May 17 00:35:55.036390 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 17 00:35:55.036402 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 17 00:35:55.042435 kernel: last_pfn = 0x2c0000 max_arch_pfn = 0x400000000 May 17 00:35:55.042456 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 17 00:35:55.042467 kernel: e820: update [mem 0x40000000-0xffffffff] usable ==> reserved May 17 00:35:55.042480 kernel: last_pfn = 0x40000 max_arch_pfn = 0x400000000 May 17 00:35:55.042491 kernel: Using GB pages for direct mapping May 17 00:35:55.042499 kernel: Secure boot disabled May 17 00:35:55.042507 kernel: ACPI: Early table checksum verification disabled May 17 00:35:55.042516 kernel: ACPI: RSDP 0x000000003FFFA014 000024 (v02 VRTUAL) May 17 00:35:55.042523 kernel: ACPI: XSDT 0x000000003FFF90E8 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:35:55.042530 kernel: ACPI: FACP 0x000000003FFF8000 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:35:55.042540 kernel: ACPI: DSDT 0x000000003FFD6000 01E184 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) May 17 00:35:55.042554 kernel: ACPI: FACS 0x000000003FFFE000 000040 May 17 00:35:55.042562 kernel: ACPI: OEM0 0x000000003FFF7000 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:35:55.042571 kernel: ACPI: SPCR 0x000000003FFF6000 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:35:55.042578 kernel: ACPI: WAET 0x000000003FFF5000 000028 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:35:55.042588 kernel: ACPI: APIC 0x000000003FFD5000 000058 (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:35:55.042595 kernel: ACPI: SRAT 0x000000003FFD4000 0002D0 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:35:55.042608 kernel: ACPI: BGRT 0x000000003FFD3000 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:35:55.042616 kernel: ACPI: FPDT 0x000000003FFD2000 000034 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:35:55.042625 kernel: ACPI: Reserving FACP table memory at [mem 0x3fff8000-0x3fff8113] May 17 00:35:55.042632 kernel: ACPI: Reserving DSDT table memory at [mem 0x3ffd6000-0x3fff4183] May 17 00:35:55.042642 kernel: ACPI: Reserving FACS table memory at [mem 0x3fffe000-0x3fffe03f] May 17 00:35:55.042650 kernel: ACPI: Reserving OEM0 table memory at [mem 0x3fff7000-0x3fff7063] May 17 00:35:55.042658 kernel: ACPI: Reserving SPCR table memory at [mem 0x3fff6000-0x3fff604f] May 17 00:35:55.042665 kernel: ACPI: Reserving WAET table memory at [mem 0x3fff5000-0x3fff5027] May 17 00:35:55.042676 kernel: ACPI: Reserving APIC table memory at [mem 0x3ffd5000-0x3ffd5057] May 17 00:35:55.042686 kernel: ACPI: Reserving SRAT table memory at [mem 0x3ffd4000-0x3ffd42cf] May 17 00:35:55.042693 kernel: ACPI: Reserving BGRT table memory at [mem 0x3ffd3000-0x3ffd3037] May 17 00:35:55.042701 kernel: ACPI: Reserving FPDT table memory at [mem 0x3ffd2000-0x3ffd2033] May 17 00:35:55.042710 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 May 17 00:35:55.042719 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 May 17 00:35:55.042727 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x3fffffff] hotplug May 17 00:35:55.042734 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x2bfffffff] hotplug May 17 00:35:55.042743 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2c0000000-0xfdfffffff] hotplug May 17 00:35:55.042755 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000-0xffffffffff] hotplug May 17 00:35:55.042762 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x10000000000-0x1ffffffffff] hotplug May 17 00:35:55.042771 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x20000000000-0x3ffffffffff] hotplug May 17 00:35:55.042779 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x40000000000-0x7ffffffffff] hotplug May 17 00:35:55.042786 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000000-0xfffffffffff] hotplug May 17 00:35:55.042793 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000000-0x1fffffffffff] hotplug May 17 00:35:55.042800 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x200000000000-0x3fffffffffff] hotplug May 17 00:35:55.042806 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x400000000000-0x7fffffffffff] hotplug May 17 00:35:55.042813 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x800000000000-0xffffffffffff] hotplug May 17 00:35:55.042822 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000000-0x1ffffffffffff] hotplug May 17 00:35:55.042828 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2000000000000-0x3ffffffffffff] hotplug May 17 00:35:55.042835 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x4000000000000-0x7ffffffffffff] hotplug May 17 00:35:55.042842 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x8000000000000-0xfffffffffffff] hotplug May 17 00:35:55.042849 kernel: NUMA: Node 0 [mem 0x00000000-0x3fffffff] + [mem 0x100000000-0x2bfffffff] -> [mem 0x00000000-0x2bfffffff] May 17 00:35:55.042856 kernel: NODE_DATA(0) allocated [mem 0x2bfffa000-0x2bfffffff] May 17 00:35:55.042864 kernel: Zone ranges: May 17 00:35:55.042873 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 17 00:35:55.042879 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] May 17 00:35:55.042891 kernel: Normal [mem 0x0000000100000000-0x00000002bfffffff] May 17 00:35:55.042899 kernel: Movable zone start for each node May 17 00:35:55.042908 kernel: Early memory node ranges May 17 00:35:55.042915 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] May 17 00:35:55.042924 kernel: node 0: [mem 0x0000000000100000-0x000000003ff40fff] May 17 00:35:55.042933 kernel: node 0: [mem 0x000000003ffff000-0x000000003fffffff] May 17 00:35:55.042942 kernel: node 0: [mem 0x0000000100000000-0x00000002bfffffff] May 17 00:35:55.042948 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000002bfffffff] May 17 00:35:55.042959 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 17 00:35:55.042970 kernel: On node 0, zone DMA: 96 pages in unavailable ranges May 17 00:35:55.042978 kernel: On node 0, zone DMA32: 190 pages in unavailable ranges May 17 00:35:55.042985 kernel: ACPI: PM-Timer IO Port: 0x408 May 17 00:35:55.042996 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] dfl dfl lint[0x1]) May 17 00:35:55.043005 kernel: IOAPIC[0]: apic_id 2, version 17, address 0xfec00000, GSI 0-23 May 17 00:35:55.043012 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 17 00:35:55.043021 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 17 00:35:55.043029 kernel: ACPI: SPCR: console: uart,io,0x3f8,115200 May 17 00:35:55.043039 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs May 17 00:35:55.043048 kernel: [mem 0x40000000-0xffffffff] available for PCI devices May 17 00:35:55.043058 kernel: Booting paravirtualized kernel on Hyper-V May 17 00:35:55.043066 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 17 00:35:55.043075 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 May 17 00:35:55.043082 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 May 17 00:35:55.043092 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 May 17 00:35:55.043099 kernel: pcpu-alloc: [0] 0 1 May 17 00:35:55.043109 kernel: Hyper-V: PV spinlocks enabled May 17 00:35:55.043116 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) May 17 00:35:55.043128 kernel: Built 1 zonelists, mobility grouping on. Total pages: 2062618 May 17 00:35:55.043136 kernel: Policy zone: Normal May 17 00:35:55.043146 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:35:55.043154 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 17 00:35:55.043164 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) May 17 00:35:55.043173 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 17 00:35:55.043180 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 17 00:35:55.043188 kernel: Memory: 8079144K/8387460K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47472K init, 4108K bss, 308056K reserved, 0K cma-reserved) May 17 00:35:55.043199 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 May 17 00:35:55.043210 kernel: ftrace: allocating 34585 entries in 136 pages May 17 00:35:55.043224 kernel: ftrace: allocated 136 pages with 2 groups May 17 00:35:55.043236 kernel: rcu: Hierarchical RCU implementation. May 17 00:35:55.043246 kernel: rcu: RCU event tracing is enabled. May 17 00:35:55.043253 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. May 17 00:35:55.043264 kernel: Rude variant of Tasks RCU enabled. May 17 00:35:55.043273 kernel: Tracing variant of Tasks RCU enabled. May 17 00:35:55.043281 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 17 00:35:55.043289 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 May 17 00:35:55.043299 kernel: Using NULL legacy PIC May 17 00:35:55.043311 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 0 May 17 00:35:55.043318 kernel: Console: colour dummy device 80x25 May 17 00:35:55.043328 kernel: printk: console [tty1] enabled May 17 00:35:55.043338 kernel: printk: console [ttyS0] enabled May 17 00:35:55.043347 kernel: printk: bootconsole [earlyser0] disabled May 17 00:35:55.043357 kernel: ACPI: Core revision 20210730 May 17 00:35:55.043367 kernel: Failed to register legacy timer interrupt May 17 00:35:55.043378 kernel: APIC: Switch to symmetric I/O mode setup May 17 00:35:55.043385 kernel: Hyper-V: Using IPI hypercalls May 17 00:35:55.043394 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 5187.81 BogoMIPS (lpj=2593905) May 17 00:35:55.043403 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 May 17 00:35:55.052065 kernel: Last level dTLB entries: 4KB 64, 2MB 32, 4MB 32, 1GB 4 May 17 00:35:55.052084 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 17 00:35:55.052096 kernel: Spectre V2 : Mitigation: Retpolines May 17 00:35:55.052107 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 17 00:35:55.052122 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! May 17 00:35:55.052134 kernel: RETBleed: Vulnerable May 17 00:35:55.052144 kernel: Speculative Store Bypass: Vulnerable May 17 00:35:55.052154 kernel: TAA: Vulnerable: Clear CPU buffers attempted, no microcode May 17 00:35:55.052166 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode May 17 00:35:55.052177 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 17 00:35:55.052189 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 17 00:35:55.052201 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 17 00:35:55.052214 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' May 17 00:35:55.052226 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' May 17 00:35:55.052240 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' May 17 00:35:55.052253 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 17 00:35:55.052265 kernel: x86/fpu: xstate_offset[5]: 832, xstate_sizes[5]: 64 May 17 00:35:55.052278 kernel: x86/fpu: xstate_offset[6]: 896, xstate_sizes[6]: 512 May 17 00:35:55.052289 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024 May 17 00:35:55.052302 kernel: x86/fpu: Enabled xstate features 0xe7, context size is 2432 bytes, using 'compacted' format. May 17 00:35:55.052313 kernel: Freeing SMP alternatives memory: 32K May 17 00:35:55.052323 kernel: pid_max: default: 32768 minimum: 301 May 17 00:35:55.052333 kernel: LSM: Security Framework initializing May 17 00:35:55.052341 kernel: SELinux: Initializing. May 17 00:35:55.052351 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) May 17 00:35:55.052361 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) May 17 00:35:55.052374 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz (family: 0x6, model: 0x55, stepping: 0x7) May 17 00:35:55.052382 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. May 17 00:35:55.052391 kernel: signal: max sigframe size: 3632 May 17 00:35:55.052401 kernel: rcu: Hierarchical SRCU implementation. May 17 00:35:55.052427 kernel: NMI watchdog: Perf NMI watchdog permanently disabled May 17 00:35:55.052438 kernel: smp: Bringing up secondary CPUs ... May 17 00:35:55.052446 kernel: x86: Booting SMP configuration: May 17 00:35:55.052454 kernel: .... node #0, CPUs: #1 May 17 00:35:55.052465 kernel: TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details. May 17 00:35:55.052478 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. May 17 00:35:55.052487 kernel: smp: Brought up 1 node, 2 CPUs May 17 00:35:55.052496 kernel: smpboot: Max logical packages: 1 May 17 00:35:55.052505 kernel: smpboot: Total of 2 processors activated (10375.62 BogoMIPS) May 17 00:35:55.052516 kernel: devtmpfs: initialized May 17 00:35:55.052523 kernel: x86/mm: Memory block size: 128MB May 17 00:35:55.052535 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x3fffb000-0x3fffefff] (16384 bytes) May 17 00:35:55.052542 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 17 00:35:55.052550 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) May 17 00:35:55.052560 kernel: pinctrl core: initialized pinctrl subsystem May 17 00:35:55.052569 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 17 00:35:55.052578 kernel: audit: initializing netlink subsys (disabled) May 17 00:35:55.052585 kernel: audit: type=2000 audit(1747442153.023:1): state=initialized audit_enabled=0 res=1 May 17 00:35:55.052595 kernel: thermal_sys: Registered thermal governor 'step_wise' May 17 00:35:55.052604 kernel: thermal_sys: Registered thermal governor 'user_space' May 17 00:35:55.052613 kernel: cpuidle: using governor menu May 17 00:35:55.052622 kernel: ACPI: bus type PCI registered May 17 00:35:55.052632 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 17 00:35:55.052644 kernel: dca service started, version 1.12.1 May 17 00:35:55.052652 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 17 00:35:55.052663 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 17 00:35:55.052671 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 17 00:35:55.052681 kernel: ACPI: Added _OSI(Module Device) May 17 00:35:55.052688 kernel: ACPI: Added _OSI(Processor Device) May 17 00:35:55.052698 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 17 00:35:55.052708 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 17 00:35:55.052716 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 17 00:35:55.052727 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 17 00:35:55.052737 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 17 00:35:55.052747 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 17 00:35:55.052755 kernel: ACPI: Interpreter enabled May 17 00:35:55.052765 kernel: ACPI: PM: (supports S0 S5) May 17 00:35:55.052773 kernel: ACPI: Using IOAPIC for interrupt routing May 17 00:35:55.052783 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 17 00:35:55.052791 kernel: ACPI: Enabled 1 GPEs in block 00 to 0F May 17 00:35:55.052801 kernel: iommu: Default domain type: Translated May 17 00:35:55.052814 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 17 00:35:55.052821 kernel: vgaarb: loaded May 17 00:35:55.052832 kernel: pps_core: LinuxPPS API ver. 1 registered May 17 00:35:55.052841 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 17 00:35:55.052849 kernel: PTP clock support registered May 17 00:35:55.052859 kernel: Registered efivars operations May 17 00:35:55.052867 kernel: PCI: Using ACPI for IRQ routing May 17 00:35:55.052878 kernel: PCI: System does not support PCI May 17 00:35:55.052885 kernel: clocksource: Switched to clocksource hyperv_clocksource_tsc_page May 17 00:35:55.052897 kernel: VFS: Disk quotas dquot_6.6.0 May 17 00:35:55.052908 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 17 00:35:55.052915 kernel: pnp: PnP ACPI init May 17 00:35:55.052925 kernel: pnp: PnP ACPI: found 3 devices May 17 00:35:55.052934 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 17 00:35:55.052944 kernel: NET: Registered PF_INET protocol family May 17 00:35:55.052951 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) May 17 00:35:55.052962 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) May 17 00:35:55.052971 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 17 00:35:55.052982 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) May 17 00:35:55.052991 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) May 17 00:35:55.053000 kernel: TCP: Hash tables configured (established 65536 bind 65536) May 17 00:35:55.053010 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) May 17 00:35:55.053017 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) May 17 00:35:55.053027 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 17 00:35:55.053036 kernel: NET: Registered PF_XDP protocol family May 17 00:35:55.053046 kernel: PCI: CLS 0 bytes, default 64 May 17 00:35:55.053053 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) May 17 00:35:55.053066 kernel: software IO TLB: mapped [mem 0x000000003a8ad000-0x000000003e8ad000] (64MB) May 17 00:35:55.053075 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer May 17 00:35:55.053084 kernel: Initialise system trusted keyrings May 17 00:35:55.053092 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 May 17 00:35:55.053101 kernel: Key type asymmetric registered May 17 00:35:55.053111 kernel: Asymmetric key parser 'x509' registered May 17 00:35:55.053119 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 17 00:35:55.053128 kernel: io scheduler mq-deadline registered May 17 00:35:55.053136 kernel: io scheduler kyber registered May 17 00:35:55.053148 kernel: io scheduler bfq registered May 17 00:35:55.053156 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 17 00:35:55.053166 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 17 00:35:55.053177 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 17 00:35:55.053184 kernel: 00:01: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A May 17 00:35:55.053195 kernel: i8042: PNP: No PS/2 controller found. May 17 00:35:55.053345 kernel: rtc_cmos 00:02: registered as rtc0 May 17 00:35:55.053446 kernel: rtc_cmos 00:02: setting system clock to 2025-05-17T00:35:54 UTC (1747442154) May 17 00:35:55.053535 kernel: rtc_cmos 00:02: alarms up to one month, 114 bytes nvram May 17 00:35:55.053547 kernel: intel_pstate: CPU model not supported May 17 00:35:55.053557 kernel: efifb: probing for efifb May 17 00:35:55.053566 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k May 17 00:35:55.053574 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 May 17 00:35:55.053584 kernel: efifb: scrolling: redraw May 17 00:35:55.053594 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 May 17 00:35:55.053602 kernel: Console: switching to colour frame buffer device 128x48 May 17 00:35:55.053616 kernel: fb0: EFI VGA frame buffer device May 17 00:35:55.053625 kernel: pstore: Registered efi as persistent store backend May 17 00:35:55.053634 kernel: NET: Registered PF_INET6 protocol family May 17 00:35:55.053643 kernel: Segment Routing with IPv6 May 17 00:35:55.053653 kernel: In-situ OAM (IOAM) with IPv6 May 17 00:35:55.053663 kernel: NET: Registered PF_PACKET protocol family May 17 00:35:55.053671 kernel: Key type dns_resolver registered May 17 00:35:55.053680 kernel: IPI shorthand broadcast: enabled May 17 00:35:55.053689 kernel: sched_clock: Marking stable (697071000, 21262800)->(881202400, -162868600) May 17 00:35:55.053699 kernel: registered taskstats version 1 May 17 00:35:55.053709 kernel: Loading compiled-in X.509 certificates May 17 00:35:55.053719 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.182-flatcar: 01ca23caa8e5879327538f9287e5164b3e97ac0c' May 17 00:35:55.053729 kernel: Key type .fscrypt registered May 17 00:35:55.053737 kernel: Key type fscrypt-provisioning registered May 17 00:35:55.053745 kernel: pstore: Using crash dump compression: deflate May 17 00:35:55.053755 kernel: ima: No TPM chip found, activating TPM-bypass! May 17 00:35:55.053766 kernel: ima: Allocated hash algorithm: sha1 May 17 00:35:55.053773 kernel: ima: No architecture policies found May 17 00:35:55.053785 kernel: clk: Disabling unused clocks May 17 00:35:55.053794 kernel: Freeing unused kernel image (initmem) memory: 47472K May 17 00:35:55.053803 kernel: Write protecting the kernel read-only data: 28672k May 17 00:35:55.053811 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 17 00:35:55.053821 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 17 00:35:55.053831 kernel: Run /init as init process May 17 00:35:55.053839 kernel: with arguments: May 17 00:35:55.053848 kernel: /init May 17 00:35:55.053857 kernel: with environment: May 17 00:35:55.053869 kernel: HOME=/ May 17 00:35:55.053876 kernel: TERM=linux May 17 00:35:55.053887 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 17 00:35:55.053898 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 00:35:55.053909 systemd[1]: Detected virtualization microsoft. May 17 00:35:55.053919 systemd[1]: Detected architecture x86-64. May 17 00:35:55.053928 systemd[1]: Running in initrd. May 17 00:35:55.053938 systemd[1]: No hostname configured, using default hostname. May 17 00:35:55.053949 systemd[1]: Hostname set to . May 17 00:35:55.053959 systemd[1]: Initializing machine ID from random generator. May 17 00:35:55.053970 systemd[1]: Queued start job for default target initrd.target. May 17 00:35:55.053978 systemd[1]: Started systemd-ask-password-console.path. May 17 00:35:55.053989 systemd[1]: Reached target cryptsetup.target. May 17 00:35:55.053999 systemd[1]: Reached target paths.target. May 17 00:35:55.054007 systemd[1]: Reached target slices.target. May 17 00:35:55.054016 systemd[1]: Reached target swap.target. May 17 00:35:55.054028 systemd[1]: Reached target timers.target. May 17 00:35:55.054039 systemd[1]: Listening on iscsid.socket. May 17 00:35:55.054047 systemd[1]: Listening on iscsiuio.socket. May 17 00:35:55.054058 systemd[1]: Listening on systemd-journald-audit.socket. May 17 00:35:55.054069 systemd[1]: Listening on systemd-journald-dev-log.socket. May 17 00:35:55.054077 systemd[1]: Listening on systemd-journald.socket. May 17 00:35:55.054088 systemd[1]: Listening on systemd-networkd.socket. May 17 00:35:55.054097 systemd[1]: Listening on systemd-udevd-control.socket. May 17 00:35:55.054109 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 00:35:55.054118 systemd[1]: Reached target sockets.target. May 17 00:35:55.054128 systemd[1]: Starting kmod-static-nodes.service... May 17 00:35:55.054139 systemd[1]: Finished network-cleanup.service. May 17 00:35:55.054146 systemd[1]: Starting systemd-fsck-usr.service... May 17 00:35:55.054158 systemd[1]: Starting systemd-journald.service... May 17 00:35:55.054168 systemd[1]: Starting systemd-modules-load.service... May 17 00:35:55.054177 systemd[1]: Starting systemd-resolved.service... May 17 00:35:55.054187 systemd[1]: Starting systemd-vconsole-setup.service... May 17 00:35:55.054198 systemd[1]: Finished kmod-static-nodes.service. May 17 00:35:55.054208 systemd[1]: Finished systemd-fsck-usr.service. May 17 00:35:55.054217 kernel: audit: type=1130 audit(1747442155.042:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:55.054227 systemd[1]: Finished systemd-vconsole-setup.service. May 17 00:35:55.054242 systemd-journald[183]: Journal started May 17 00:35:55.054294 systemd-journald[183]: Runtime Journal (/run/log/journal/7d71a7f38cf646bdaed0c963e5359fac) is 8.0M, max 159.0M, 151.0M free. May 17 00:35:55.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:55.020001 systemd-modules-load[184]: Inserted module 'overlay' May 17 00:35:55.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:55.074424 kernel: audit: type=1130 audit(1747442155.063:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:55.074451 systemd[1]: Started systemd-journald.service. May 17 00:35:55.094678 systemd-resolved[185]: Positive Trust Anchors: May 17 00:35:55.094699 systemd-resolved[185]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 00:35:55.094740 systemd-resolved[185]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 00:35:55.126275 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 17 00:35:55.126305 kernel: audit: type=1130 audit(1747442155.104:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:55.104000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:55.129703 systemd-resolved[185]: Defaulting to hostname 'linux'. May 17 00:35:55.130839 systemd[1]: Starting dracut-cmdline-ask.service... May 17 00:35:55.137070 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 17 00:35:55.141023 systemd[1]: Started systemd-resolved.service. May 17 00:35:55.155285 kernel: audit: type=1130 audit(1747442155.143:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:55.143000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:55.143830 systemd[1]: Reached target nss-lookup.target. May 17 00:35:55.161553 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 17 00:35:55.179456 kernel: Bridge firewalling registered May 17 00:35:55.179518 kernel: audit: type=1130 audit(1747442155.163:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:55.163000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:55.179471 systemd-modules-load[184]: Inserted module 'br_netfilter' May 17 00:35:55.181683 systemd[1]: Finished dracut-cmdline-ask.service. May 17 00:35:55.186096 systemd[1]: Starting dracut-cmdline.service... May 17 00:35:55.183000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:55.198741 kernel: audit: type=1130 audit(1747442155.183:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:55.210371 dracut-cmdline[200]: dracut-dracut-053 May 17 00:35:55.214518 dracut-cmdline[200]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:35:55.240433 kernel: SCSI subsystem initialized May 17 00:35:55.265472 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 17 00:35:55.265546 kernel: device-mapper: uevent: version 1.0.3 May 17 00:35:55.265563 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 17 00:35:55.274934 systemd-modules-load[184]: Inserted module 'dm_multipath' May 17 00:35:55.276907 systemd[1]: Finished systemd-modules-load.service. May 17 00:35:55.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:55.294033 kernel: audit: type=1130 audit(1747442155.277:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:55.292891 systemd[1]: Starting systemd-sysctl.service... May 17 00:35:55.301528 kernel: Loading iSCSI transport class v2.0-870. May 17 00:35:55.304914 systemd[1]: Finished systemd-sysctl.service. May 17 00:35:55.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:55.319431 kernel: audit: type=1130 audit(1747442155.304:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:55.333437 kernel: iscsi: registered transport (tcp) May 17 00:35:55.360292 kernel: iscsi: registered transport (qla4xxx) May 17 00:35:55.360365 kernel: QLogic iSCSI HBA Driver May 17 00:35:55.389315 systemd[1]: Finished dracut-cmdline.service. May 17 00:35:55.406112 kernel: audit: type=1130 audit(1747442155.391:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:55.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:55.392150 systemd[1]: Starting dracut-pre-udev.service... May 17 00:35:55.450435 kernel: raid6: avx512x4 gen() 18465 MB/s May 17 00:35:55.470430 kernel: raid6: avx512x4 xor() 8279 MB/s May 17 00:35:55.490426 kernel: raid6: avx512x2 gen() 18739 MB/s May 17 00:35:55.509423 kernel: raid6: avx512x2 xor() 29258 MB/s May 17 00:35:55.529428 kernel: raid6: avx512x1 gen() 18877 MB/s May 17 00:35:55.549426 kernel: raid6: avx512x1 xor() 26789 MB/s May 17 00:35:55.569437 kernel: raid6: avx2x4 gen() 18750 MB/s May 17 00:35:55.589428 kernel: raid6: avx2x4 xor() 7868 MB/s May 17 00:35:55.609428 kernel: raid6: avx2x2 gen() 18682 MB/s May 17 00:35:55.629443 kernel: raid6: avx2x2 xor() 22149 MB/s May 17 00:35:55.650432 kernel: raid6: avx2x1 gen() 13768 MB/s May 17 00:35:55.670429 kernel: raid6: avx2x1 xor() 18873 MB/s May 17 00:35:55.690426 kernel: raid6: sse2x4 gen() 11525 MB/s May 17 00:35:55.710428 kernel: raid6: sse2x4 xor() 7229 MB/s May 17 00:35:55.730425 kernel: raid6: sse2x2 gen() 12955 MB/s May 17 00:35:55.750426 kernel: raid6: sse2x2 xor() 7659 MB/s May 17 00:35:55.770429 kernel: raid6: sse2x1 gen() 11458 MB/s May 17 00:35:55.793277 kernel: raid6: sse2x1 xor() 5909 MB/s May 17 00:35:55.793309 kernel: raid6: using algorithm avx512x1 gen() 18877 MB/s May 17 00:35:55.793332 kernel: raid6: .... xor() 26789 MB/s, rmw enabled May 17 00:35:55.796437 kernel: raid6: using avx512x2 recovery algorithm May 17 00:35:55.814437 kernel: xor: automatically using best checksumming function avx May 17 00:35:55.909439 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 17 00:35:55.917831 systemd[1]: Finished dracut-pre-udev.service. May 17 00:35:55.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:55.921000 audit: BPF prog-id=7 op=LOAD May 17 00:35:55.921000 audit: BPF prog-id=8 op=LOAD May 17 00:35:55.922558 systemd[1]: Starting systemd-udevd.service... May 17 00:35:55.935656 systemd-udevd[384]: Using default interface naming scheme 'v252'. May 17 00:35:55.940210 systemd[1]: Started systemd-udevd.service. May 17 00:35:55.946000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:55.949540 systemd[1]: Starting dracut-pre-trigger.service... May 17 00:35:55.964378 dracut-pre-trigger[405]: rd.md=0: removing MD RAID activation May 17 00:35:55.993044 systemd[1]: Finished dracut-pre-trigger.service. May 17 00:35:55.994000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:55.995707 systemd[1]: Starting systemd-udev-trigger.service... May 17 00:35:56.032181 systemd[1]: Finished systemd-udev-trigger.service. May 17 00:35:56.033000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:56.079434 kernel: cryptd: max_cpu_qlen set to 1000 May 17 00:35:56.083434 kernel: hv_vmbus: Vmbus version:5.2 May 17 00:35:56.107433 kernel: hv_vmbus: registering driver hyperv_keyboard May 17 00:35:56.116436 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 May 17 00:35:56.145428 kernel: hv_vmbus: registering driver hv_storvsc May 17 00:35:56.145472 kernel: hid: raw HID events driver (C) Jiri Kosina May 17 00:35:56.158916 kernel: scsi host1: storvsc_host_t May 17 00:35:56.158999 kernel: hv_vmbus: registering driver hv_netvsc May 17 00:35:56.167676 kernel: scsi host0: storvsc_host_t May 17 00:35:56.167897 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 May 17 00:35:56.170962 kernel: AVX2 version of gcm_enc/dec engaged. May 17 00:35:56.171000 kernel: hv_vmbus: registering driver hid_hyperv May 17 00:35:56.176764 kernel: AES CTR mode by8 optimization enabled May 17 00:35:56.176791 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 May 17 00:35:56.186185 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 May 17 00:35:56.193432 kernel: hid 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on May 17 00:35:56.212671 kernel: sr 0:0:0:2: [sr0] scsi-1 drive May 17 00:35:56.221513 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 May 17 00:35:56.221534 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) May 17 00:35:56.239042 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks May 17 00:35:56.239237 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 May 17 00:35:56.239407 kernel: sd 0:0:0:0: [sda] Write Protect is off May 17 00:35:56.239596 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 May 17 00:35:56.239725 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA May 17 00:35:56.239822 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 00:35:56.239833 kernel: sd 0:0:0:0: [sda] Attached SCSI disk May 17 00:35:56.369605 kernel: hv_netvsc 6045bdfc-30ed-6045-bdfc-30ed6045bdfc eth0: VF slot 1 added May 17 00:35:56.369853 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (438) May 17 00:35:56.377435 kernel: hv_vmbus: registering driver hv_pci May 17 00:35:56.387430 kernel: hv_pci aec067b7-b393-4e17-8005-d5ae0d241ce5: PCI VMBus probing: Using version 0x10004 May 17 00:35:56.478601 kernel: hv_pci aec067b7-b393-4e17-8005-d5ae0d241ce5: PCI host bridge to bus b393:00 May 17 00:35:56.478774 kernel: pci_bus b393:00: root bus resource [mem 0xfe0000000-0xfe00fffff window] May 17 00:35:56.478956 kernel: pci_bus b393:00: No busn resource found for root bus, will use [bus 00-ff] May 17 00:35:56.479105 kernel: pci b393:00:02.0: [15b3:1016] type 00 class 0x020000 May 17 00:35:56.479281 kernel: pci b393:00:02.0: reg 0x10: [mem 0xfe0000000-0xfe00fffff 64bit pref] May 17 00:35:56.479586 kernel: pci b393:00:02.0: enabling Extended Tags May 17 00:35:56.479757 kernel: pci b393:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at b393:00:02.0 (capable of 63.008 Gb/s with 8.0 GT/s PCIe x8 link) May 17 00:35:56.479921 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 00:35:56.479940 kernel: pci_bus b393:00: busn_res: [bus 00-ff] end is updated to 00 May 17 00:35:56.480093 kernel: pci b393:00:02.0: BAR 0: assigned [mem 0xfe0000000-0xfe00fffff 64bit pref] May 17 00:35:56.390994 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 17 00:35:56.418066 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 00:35:56.429644 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 17 00:35:56.443933 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 17 00:35:56.446238 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 17 00:35:56.449185 systemd[1]: Starting disk-uuid.service... May 17 00:35:56.634440 kernel: mlx5_core b393:00:02.0: firmware version: 14.30.5000 May 17 00:35:56.878098 kernel: mlx5_core b393:00:02.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) May 17 00:35:56.878322 kernel: mlx5_core b393:00:02.0: Supported tc offload range - chains: 1, prios: 1 May 17 00:35:56.878538 kernel: mlx5_core b393:00:02.0: mlx5e_tc_post_act_init:40:(pid 188): firmware level support is missing May 17 00:35:56.878739 kernel: hv_netvsc 6045bdfc-30ed-6045-bdfc-30ed6045bdfc eth0: VF registering: eth1 May 17 00:35:56.878920 kernel: mlx5_core b393:00:02.0 eth1: joined to eth0 May 17 00:35:56.886432 kernel: mlx5_core b393:00:02.0 enP45971s1: renamed from eth1 May 17 00:35:57.466443 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 00:35:57.466990 disk-uuid[548]: The operation has completed successfully. May 17 00:35:57.544863 systemd[1]: disk-uuid.service: Deactivated successfully. May 17 00:35:57.547000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:57.547000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:57.544965 systemd[1]: Finished disk-uuid.service. May 17 00:35:57.549884 systemd[1]: Starting verity-setup.service... May 17 00:35:57.575626 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" May 17 00:35:57.656000 systemd[1]: Found device dev-mapper-usr.device. May 17 00:35:57.661452 systemd[1]: Finished verity-setup.service. May 17 00:35:57.664000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:57.665547 systemd[1]: Mounting sysusr-usr.mount... May 17 00:35:57.738434 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 17 00:35:57.738575 systemd[1]: Mounted sysusr-usr.mount. May 17 00:35:57.740348 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 17 00:35:57.741110 systemd[1]: Starting ignition-setup.service... May 17 00:35:57.752649 systemd[1]: Starting parse-ip-for-networkd.service... May 17 00:35:57.770451 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm May 17 00:35:57.770504 kernel: BTRFS info (device sda6): using free space tree May 17 00:35:57.770522 kernel: BTRFS info (device sda6): has skinny extents May 17 00:35:57.805865 systemd[1]: mnt-oem.mount: Deactivated successfully. May 17 00:35:57.827000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:57.825458 systemd[1]: Finished parse-ip-for-networkd.service. May 17 00:35:57.829000 audit: BPF prog-id=9 op=LOAD May 17 00:35:57.830959 systemd[1]: Starting systemd-networkd.service... May 17 00:35:57.847695 systemd[1]: Finished ignition-setup.service. May 17 00:35:57.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:57.850562 systemd[1]: Starting ignition-fetch-offline.service... May 17 00:35:57.862938 systemd-networkd[778]: lo: Link UP May 17 00:35:57.862947 systemd-networkd[778]: lo: Gained carrier May 17 00:35:57.866192 systemd-networkd[778]: Enumeration completed May 17 00:35:57.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:57.866279 systemd[1]: Started systemd-networkd.service. May 17 00:35:57.869740 systemd[1]: Reached target network.target. May 17 00:35:57.870720 systemd-networkd[778]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 00:35:57.879348 systemd[1]: Starting iscsiuio.service... May 17 00:35:57.885150 systemd[1]: Started iscsiuio.service. May 17 00:35:57.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:57.888368 systemd[1]: Starting iscsid.service... May 17 00:35:57.894725 iscsid[785]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 17 00:35:57.894725 iscsid[785]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 17 00:35:57.894725 iscsid[785]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 17 00:35:57.894725 iscsid[785]: If using hardware iscsi like qla4xxx this message can be ignored. May 17 00:35:57.894725 iscsid[785]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 17 00:35:57.894725 iscsid[785]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 17 00:35:57.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:57.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:57.894793 systemd[1]: Started iscsid.service. May 17 00:35:57.898182 systemd[1]: Starting dracut-initqueue.service... May 17 00:35:57.914279 systemd[1]: Finished dracut-initqueue.service. May 17 00:35:57.918007 systemd[1]: Reached target remote-fs-pre.target. May 17 00:35:57.922391 systemd[1]: Reached target remote-cryptsetup.target. May 17 00:35:57.946000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:57.927554 systemd[1]: Reached target remote-fs.target. May 17 00:35:57.931950 systemd[1]: Starting dracut-pre-mount.service... May 17 00:35:57.954314 kernel: mlx5_core b393:00:02.0 enP45971s1: Link up May 17 00:35:57.943848 systemd[1]: Finished dracut-pre-mount.service. May 17 00:35:57.982662 kernel: hv_netvsc 6045bdfc-30ed-6045-bdfc-30ed6045bdfc eth0: Data path switched to VF: enP45971s1 May 17 00:35:57.987435 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:35:57.987642 systemd-networkd[778]: enP45971s1: Link UP May 17 00:35:57.987779 systemd-networkd[778]: eth0: Link UP May 17 00:35:57.988347 systemd-networkd[778]: eth0: Gained carrier May 17 00:35:57.994142 systemd-networkd[778]: enP45971s1: Gained carrier May 17 00:35:58.022495 systemd-networkd[778]: eth0: DHCPv4 address 10.200.4.22/24, gateway 10.200.4.1 acquired from 168.63.129.16 May 17 00:35:58.662249 ignition[780]: Ignition 2.14.0 May 17 00:35:58.662264 ignition[780]: Stage: fetch-offline May 17 00:35:58.662352 ignition[780]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:35:58.662429 ignition[780]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:35:58.690033 ignition[780]: no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:35:58.690206 ignition[780]: parsed url from cmdline: "" May 17 00:35:58.690210 ignition[780]: no config URL provided May 17 00:35:58.690215 ignition[780]: reading system config file "/usr/lib/ignition/user.ign" May 17 00:35:58.692813 ignition[780]: no config at "/usr/lib/ignition/user.ign" May 17 00:35:58.692825 ignition[780]: failed to fetch config: resource requires networking May 17 00:35:58.696539 ignition[780]: Ignition finished successfully May 17 00:35:58.704110 systemd[1]: Finished ignition-fetch-offline.service. May 17 00:35:58.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:58.707284 systemd[1]: Starting ignition-fetch.service... May 17 00:35:58.717308 ignition[805]: Ignition 2.14.0 May 17 00:35:58.717319 ignition[805]: Stage: fetch May 17 00:35:58.717462 ignition[805]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:35:58.717494 ignition[805]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:35:58.727174 ignition[805]: no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:35:58.729751 ignition[805]: parsed url from cmdline: "" May 17 00:35:58.729759 ignition[805]: no config URL provided May 17 00:35:58.729767 ignition[805]: reading system config file "/usr/lib/ignition/user.ign" May 17 00:35:58.729780 ignition[805]: no config at "/usr/lib/ignition/user.ign" May 17 00:35:58.729821 ignition[805]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 May 17 00:35:58.812588 ignition[805]: GET result: OK May 17 00:35:58.812779 ignition[805]: config has been read from IMDS userdata May 17 00:35:58.812795 ignition[805]: parsing config with SHA512: 42e799419d70784d1a51f85ac94ad480f72c15fa787c81d634fb53dfca42963588451027a299cf6b3351cc1a2bd2b6c88c1259a177dd14a5a8e49b273b9ce3ca May 17 00:35:58.815914 unknown[805]: fetched base config from "system" May 17 00:35:58.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:58.816470 ignition[805]: fetch: fetch complete May 17 00:35:58.815925 unknown[805]: fetched base config from "system" May 17 00:35:58.816477 ignition[805]: fetch: fetch passed May 17 00:35:58.815934 unknown[805]: fetched user config from "azure" May 17 00:35:58.816526 ignition[805]: Ignition finished successfully May 17 00:35:58.818287 systemd[1]: Finished ignition-fetch.service. May 17 00:35:58.821317 systemd[1]: Starting ignition-kargs.service... May 17 00:35:58.834318 ignition[811]: Ignition 2.14.0 May 17 00:35:58.834325 ignition[811]: Stage: kargs May 17 00:35:58.834473 ignition[811]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:35:58.834500 ignition[811]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:35:58.840342 ignition[811]: no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:35:58.841678 ignition[811]: kargs: kargs passed May 17 00:35:58.842121 ignition[811]: Ignition finished successfully May 17 00:35:58.848544 systemd[1]: Finished ignition-kargs.service. May 17 00:35:58.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:58.851306 systemd[1]: Starting ignition-disks.service... May 17 00:35:58.859932 ignition[817]: Ignition 2.14.0 May 17 00:35:58.859944 ignition[817]: Stage: disks May 17 00:35:58.860086 ignition[817]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:35:58.860118 ignition[817]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:35:58.865411 ignition[817]: no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:35:58.866903 ignition[817]: disks: disks passed May 17 00:35:58.866947 ignition[817]: Ignition finished successfully May 17 00:35:58.872026 systemd[1]: Finished ignition-disks.service. May 17 00:35:58.875000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:58.875990 systemd[1]: Reached target initrd-root-device.target. May 17 00:35:58.880039 systemd[1]: Reached target local-fs-pre.target. May 17 00:35:58.882152 systemd[1]: Reached target local-fs.target. May 17 00:35:58.887751 systemd[1]: Reached target sysinit.target. May 17 00:35:58.891249 systemd[1]: Reached target basic.target. May 17 00:35:58.895424 systemd[1]: Starting systemd-fsck-root.service... May 17 00:35:58.918147 systemd-fsck[825]: ROOT: clean, 619/7326000 files, 481079/7359488 blocks May 17 00:35:58.922056 systemd[1]: Finished systemd-fsck-root.service. May 17 00:35:58.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:58.924821 systemd[1]: Mounting sysroot.mount... May 17 00:35:58.940440 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 17 00:35:58.940597 systemd[1]: Mounted sysroot.mount. May 17 00:35:58.943884 systemd[1]: Reached target initrd-root-fs.target. May 17 00:35:58.955244 systemd[1]: Mounting sysroot-usr.mount... May 17 00:35:58.960456 systemd[1]: Starting flatcar-metadata-hostname.service... May 17 00:35:58.964478 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 17 00:35:58.964515 systemd[1]: Reached target ignition-diskful.target. May 17 00:35:58.971572 systemd[1]: Mounted sysroot-usr.mount. May 17 00:35:58.987147 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 17 00:35:58.992377 systemd[1]: Starting initrd-setup-root.service... May 17 00:35:58.998884 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (835) May 17 00:35:59.008225 initrd-setup-root[840]: cut: /sysroot/etc/passwd: No such file or directory May 17 00:35:59.016548 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm May 17 00:35:59.016568 kernel: BTRFS info (device sda6): using free space tree May 17 00:35:59.016582 kernel: BTRFS info (device sda6): has skinny extents May 17 00:35:59.019683 initrd-setup-root[866]: cut: /sysroot/etc/group: No such file or directory May 17 00:35:59.020859 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 17 00:35:59.032524 initrd-setup-root[874]: cut: /sysroot/etc/shadow: No such file or directory May 17 00:35:59.037203 initrd-setup-root[882]: cut: /sysroot/etc/gshadow: No such file or directory May 17 00:35:59.108630 systemd-networkd[778]: eth0: Gained IPv6LL May 17 00:35:59.159478 systemd[1]: Finished initrd-setup-root.service. May 17 00:35:59.162000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:59.164169 systemd[1]: Starting ignition-mount.service... May 17 00:35:59.168856 systemd[1]: Starting sysroot-boot.service... May 17 00:35:59.177837 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. May 17 00:35:59.180458 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. May 17 00:35:59.201043 ignition[902]: INFO : Ignition 2.14.0 May 17 00:35:59.201043 ignition[902]: INFO : Stage: mount May 17 00:35:59.207238 ignition[902]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:35:59.207238 ignition[902]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:35:59.207238 ignition[902]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:35:59.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:59.217056 systemd[1]: Finished sysroot-boot.service. May 17 00:35:59.223514 ignition[902]: INFO : mount: mount passed May 17 00:35:59.223514 ignition[902]: INFO : Ignition finished successfully May 17 00:35:59.223000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:59.219274 systemd[1]: Finished ignition-mount.service. May 17 00:35:59.395909 coreos-metadata[834]: May 17 00:35:59.395 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 May 17 00:35:59.403020 coreos-metadata[834]: May 17 00:35:59.402 INFO Fetch successful May 17 00:35:59.435863 coreos-metadata[834]: May 17 00:35:59.435 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 May 17 00:35:59.450156 coreos-metadata[834]: May 17 00:35:59.450 INFO Fetch successful May 17 00:35:59.456212 coreos-metadata[834]: May 17 00:35:59.456 INFO wrote hostname ci-3510.3.7-n-a14653f0ea to /sysroot/etc/hostname May 17 00:35:59.457994 systemd[1]: Finished flatcar-metadata-hostname.service. May 17 00:35:59.470137 kernel: kauditd_printk_skb: 25 callbacks suppressed May 17 00:35:59.470174 kernel: audit: type=1130 audit(1747442159.463:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:59.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:59.464955 systemd[1]: Starting ignition-files.service... May 17 00:35:59.486325 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 17 00:35:59.501448 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (914) May 17 00:35:59.511187 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm May 17 00:35:59.511254 kernel: BTRFS info (device sda6): using free space tree May 17 00:35:59.511268 kernel: BTRFS info (device sda6): has skinny extents May 17 00:35:59.519404 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 17 00:35:59.531985 ignition[933]: INFO : Ignition 2.14.0 May 17 00:35:59.531985 ignition[933]: INFO : Stage: files May 17 00:35:59.535906 ignition[933]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:35:59.535906 ignition[933]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:35:59.547932 ignition[933]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:35:59.562303 ignition[933]: DEBUG : files: compiled without relabeling support, skipping May 17 00:35:59.565223 ignition[933]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 17 00:35:59.565223 ignition[933]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 17 00:35:59.581563 ignition[933]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 17 00:35:59.584825 ignition[933]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 17 00:35:59.591510 unknown[933]: wrote ssh authorized keys file for user: core May 17 00:35:59.593828 ignition[933]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 17 00:35:59.597398 ignition[933]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" May 17 00:35:59.601457 ignition[933]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" May 17 00:35:59.605658 ignition[933]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" May 17 00:35:59.609682 ignition[933]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 17 00:35:59.613662 ignition[933]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" May 17 00:35:59.619371 ignition[933]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" May 17 00:35:59.624989 ignition[933]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/etc/systemd/system/waagent.service" May 17 00:35:59.629355 ignition[933]: INFO : files: createFilesystemsFiles: createFiles: op(6): oem config not found in "/usr/share/oem", looking on oem partition May 17 00:35:59.637710 ignition[933]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3649798729" May 17 00:35:59.642294 ignition[933]: CRITICAL : files: createFilesystemsFiles: createFiles: op(6): op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3649798729": device or resource busy May 17 00:35:59.642294 ignition[933]: ERROR : files: createFilesystemsFiles: createFiles: op(6): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3649798729", trying btrfs: device or resource busy May 17 00:35:59.642294 ignition[933]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3649798729" May 17 00:35:59.642294 ignition[933]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3649798729" May 17 00:35:59.662218 ignition[933]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [started] unmounting "/mnt/oem3649798729" May 17 00:35:59.662218 ignition[933]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [finished] unmounting "/mnt/oem3649798729" May 17 00:35:59.662218 ignition[933]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" May 17 00:35:59.662218 ignition[933]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" May 17 00:35:59.662218 ignition[933]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition May 17 00:35:59.662218 ignition[933]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1684553002" May 17 00:35:59.662218 ignition[933]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1684553002": device or resource busy May 17 00:35:59.662218 ignition[933]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1684553002", trying btrfs: device or resource busy May 17 00:35:59.662218 ignition[933]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1684553002" May 17 00:35:59.662218 ignition[933]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1684553002" May 17 00:35:59.662218 ignition[933]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem1684553002" May 17 00:35:59.662218 ignition[933]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem1684553002" May 17 00:35:59.662218 ignition[933]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" May 17 00:35:59.662218 ignition[933]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" May 17 00:35:59.662218 ignition[933]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET https://extensions.flatcar.org/extensions/kubernetes-v1.33.0-x86-64.raw: attempt #1 May 17 00:36:00.458964 ignition[933]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET result: OK May 17 00:36:00.632169 ignition[933]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" May 17 00:36:00.632169 ignition[933]: INFO : files: op(f): [started] processing unit "waagent.service" May 17 00:36:00.632169 ignition[933]: INFO : files: op(f): [finished] processing unit "waagent.service" May 17 00:36:00.632169 ignition[933]: INFO : files: op(10): [started] processing unit "nvidia.service" May 17 00:36:00.632169 ignition[933]: INFO : files: op(10): [finished] processing unit "nvidia.service" May 17 00:36:00.650685 ignition[933]: INFO : files: op(11): [started] setting preset to enabled for "waagent.service" May 17 00:36:00.650685 ignition[933]: INFO : files: op(11): [finished] setting preset to enabled for "waagent.service" May 17 00:36:00.650685 ignition[933]: INFO : files: op(12): [started] setting preset to enabled for "nvidia.service" May 17 00:36:00.650685 ignition[933]: INFO : files: op(12): [finished] setting preset to enabled for "nvidia.service" May 17 00:36:00.650685 ignition[933]: INFO : files: createResultFile: createFiles: op(13): [started] writing file "/sysroot/etc/.ignition-result.json" May 17 00:36:00.650685 ignition[933]: INFO : files: createResultFile: createFiles: op(13): [finished] writing file "/sysroot/etc/.ignition-result.json" May 17 00:36:00.650685 ignition[933]: INFO : files: files passed May 17 00:36:00.650685 ignition[933]: INFO : Ignition finished successfully May 17 00:36:00.730718 kernel: audit: type=1130 audit(1747442160.647:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:00.730763 kernel: audit: type=1130 audit(1747442160.678:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:00.730782 kernel: audit: type=1131 audit(1747442160.678:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:00.730799 kernel: audit: type=1130 audit(1747442160.704:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:00.647000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:00.678000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:00.678000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:00.704000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:00.645981 systemd[1]: Finished ignition-files.service. May 17 00:36:00.663247 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 17 00:36:00.665663 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 17 00:36:00.739548 initrd-setup-root-after-ignition[958]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 17 00:36:00.666700 systemd[1]: Starting ignition-quench.service... May 17 00:36:00.673455 systemd[1]: ignition-quench.service: Deactivated successfully. May 17 00:36:00.673552 systemd[1]: Finished ignition-quench.service. May 17 00:36:00.687783 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 17 00:36:00.705025 systemd[1]: Reached target ignition-complete.target. May 17 00:36:00.720603 systemd[1]: Starting initrd-parse-etc.service... May 17 00:36:00.762402 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 17 00:36:00.766000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:00.762529 systemd[1]: Finished initrd-parse-etc.service. May 17 00:36:00.767000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:00.767553 systemd[1]: Reached target initrd-fs.target. May 17 00:36:00.791989 kernel: audit: type=1130 audit(1747442160.766:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:00.792014 kernel: audit: type=1131 audit(1747442160.767:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:00.792111 systemd[1]: Reached target initrd.target. May 17 00:36:00.795547 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 17 00:36:00.799289 systemd[1]: Starting dracut-pre-pivot.service... May 17 00:36:00.810148 systemd[1]: Finished dracut-pre-pivot.service. May 17 00:36:00.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:00.814784 systemd[1]: Starting initrd-cleanup.service... May 17 00:36:00.828336 kernel: audit: type=1130 audit(1747442160.813:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:00.833943 systemd[1]: Stopped target nss-lookup.target. May 17 00:36:00.857061 kernel: audit: type=1131 audit(1747442160.833:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:00.833000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:00.835025 systemd[1]: Stopped target remote-cryptsetup.target. May 17 00:36:00.835428 systemd[1]: Stopped target timers.target. May 17 00:36:00.835776 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 17 00:36:00.835910 systemd[1]: Stopped dracut-pre-pivot.service. May 17 00:36:00.836280 systemd[1]: Stopped target initrd.target. May 17 00:36:00.836882 systemd[1]: Stopped target basic.target. May 17 00:36:00.837284 systemd[1]: Stopped target ignition-complete.target. May 17 00:36:00.849669 systemd[1]: Stopped target ignition-diskful.target. May 17 00:36:00.861942 systemd[1]: Stopped target initrd-root-device.target. May 17 00:36:00.865546 systemd[1]: Stopped target remote-fs.target. May 17 00:36:00.869672 systemd[1]: Stopped target remote-fs-pre.target. May 17 00:36:00.878333 systemd[1]: Stopped target sysinit.target. May 17 00:36:00.886330 systemd[1]: Stopped target local-fs.target. May 17 00:36:00.889390 systemd[1]: Stopped target local-fs-pre.target. May 17 00:36:00.893271 systemd[1]: Stopped target swap.target. May 17 00:36:00.899000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:00.896452 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 17 00:36:00.915127 kernel: audit: type=1131 audit(1747442160.899:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:00.896610 systemd[1]: Stopped dracut-pre-mount.service. May 17 00:36:00.910002 systemd[1]: Stopped target cryptsetup.target. May 17 00:36:00.918000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:00.915115 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 17 00:36:00.922000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:00.915291 systemd[1]: Stopped dracut-initqueue.service. May 17 00:36:00.926000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:00.918805 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 17 00:36:00.930000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:00.918945 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 17 00:36:00.922698 systemd[1]: ignition-files.service: Deactivated successfully. May 17 00:36:00.922830 systemd[1]: Stopped ignition-files.service. May 17 00:36:00.926593 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. May 17 00:36:00.926720 systemd[1]: Stopped flatcar-metadata-hostname.service. May 17 00:36:00.946200 iscsid[785]: iscsid shutting down. May 17 00:36:00.931312 systemd[1]: Stopping ignition-mount.service... May 17 00:36:00.952369 ignition[971]: INFO : Ignition 2.14.0 May 17 00:36:00.952369 ignition[971]: INFO : Stage: umount May 17 00:36:00.952369 ignition[971]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:36:00.952369 ignition[971]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:36:00.953000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:00.958000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:00.960000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:00.964000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:00.945017 systemd[1]: Stopping iscsid.service... May 17 00:36:00.984410 ignition[971]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:36:00.984410 ignition[971]: INFO : umount: umount passed May 17 00:36:00.984410 ignition[971]: INFO : Ignition finished successfully May 17 00:36:00.949195 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 17 00:36:00.949386 systemd[1]: Stopped kmod-static-nodes.service. May 17 00:36:00.954740 systemd[1]: Stopping sysroot-boot.service... May 17 00:36:00.956478 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 17 00:36:00.956652 systemd[1]: Stopped systemd-udev-trigger.service. May 17 00:36:00.958872 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 17 00:36:00.959016 systemd[1]: Stopped dracut-pre-trigger.service. May 17 00:36:00.963305 systemd[1]: iscsid.service: Deactivated successfully. May 17 00:36:00.963437 systemd[1]: Stopped iscsid.service. May 17 00:36:00.971367 systemd[1]: Stopping iscsiuio.service... May 17 00:36:01.008289 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 17 00:36:01.010602 systemd[1]: iscsiuio.service: Deactivated successfully. May 17 00:36:01.012466 systemd[1]: Stopped iscsiuio.service. May 17 00:36:01.015000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:01.015963 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 17 00:36:01.017946 systemd[1]: Finished initrd-cleanup.service. May 17 00:36:01.021000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:01.021000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:01.021485 systemd[1]: ignition-mount.service: Deactivated successfully. May 17 00:36:01.021580 systemd[1]: Stopped ignition-mount.service. May 17 00:36:01.025000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:01.027740 systemd[1]: ignition-disks.service: Deactivated successfully. May 17 00:36:01.027802 systemd[1]: Stopped ignition-disks.service. May 17 00:36:01.033000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:01.033173 systemd[1]: ignition-kargs.service: Deactivated successfully. May 17 00:36:01.033226 systemd[1]: Stopped ignition-kargs.service. May 17 00:36:01.038000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:01.038829 systemd[1]: ignition-fetch.service: Deactivated successfully. May 17 00:36:01.038881 systemd[1]: Stopped ignition-fetch.service. May 17 00:36:01.044000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:01.044211 systemd[1]: Stopped target network.target. May 17 00:36:01.047552 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 17 00:36:01.049797 systemd[1]: Stopped ignition-fetch-offline.service. May 17 00:36:01.053000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:01.053786 systemd[1]: Stopped target paths.target. May 17 00:36:01.057042 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 17 00:36:01.059491 systemd[1]: Stopped systemd-ask-password-console.path. May 17 00:36:01.061686 systemd[1]: Stopped target slices.target. May 17 00:36:01.065739 systemd[1]: Stopped target sockets.target. May 17 00:36:01.067446 systemd[1]: iscsid.socket: Deactivated successfully. May 17 00:36:01.067492 systemd[1]: Closed iscsid.socket. May 17 00:36:01.070423 systemd[1]: iscsiuio.socket: Deactivated successfully. May 17 00:36:01.078000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:01.070466 systemd[1]: Closed iscsiuio.socket. May 17 00:36:01.073597 systemd[1]: ignition-setup.service: Deactivated successfully. May 17 00:36:01.073655 systemd[1]: Stopped ignition-setup.service. May 17 00:36:01.082236 systemd[1]: Stopping systemd-networkd.service... May 17 00:36:01.088965 systemd[1]: Stopping systemd-resolved.service... May 17 00:36:01.093465 systemd-networkd[778]: eth0: DHCPv6 lease lost May 17 00:36:01.095602 systemd[1]: systemd-networkd.service: Deactivated successfully. May 17 00:36:01.099000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:01.095700 systemd[1]: Stopped systemd-networkd.service. May 17 00:36:01.101000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:01.107000 audit: BPF prog-id=9 op=UNLOAD May 17 00:36:01.107000 audit: BPF prog-id=6 op=UNLOAD May 17 00:36:01.111000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:01.099456 systemd[1]: systemd-resolved.service: Deactivated successfully. May 17 00:36:01.115000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:01.101692 systemd[1]: Stopped systemd-resolved.service. May 17 00:36:01.119000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:01.103225 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 17 00:36:01.103258 systemd[1]: Closed systemd-networkd.socket. May 17 00:36:01.104028 systemd[1]: Stopping network-cleanup.service... May 17 00:36:01.104246 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 17 00:36:01.104295 systemd[1]: Stopped parse-ip-for-networkd.service. May 17 00:36:01.111530 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 17 00:36:01.111583 systemd[1]: Stopped systemd-sysctl.service. May 17 00:36:01.136000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:01.115794 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 17 00:36:01.115845 systemd[1]: Stopped systemd-modules-load.service. May 17 00:36:01.124188 systemd[1]: Stopping systemd-udevd.service... May 17 00:36:01.148000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:01.152000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:01.129299 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 17 00:36:01.152000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:01.133135 systemd[1]: systemd-udevd.service: Deactivated successfully. May 17 00:36:01.161000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:01.133274 systemd[1]: Stopped systemd-udevd.service. May 17 00:36:01.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:01.166000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:01.138321 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 17 00:36:01.138374 systemd[1]: Closed systemd-udevd-control.socket. May 17 00:36:01.142936 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 17 00:36:01.142975 systemd[1]: Closed systemd-udevd-kernel.socket. May 17 00:36:01.182207 kernel: hv_netvsc 6045bdfc-30ed-6045-bdfc-30ed6045bdfc eth0: Data path switched from VF: enP45971s1 May 17 00:36:01.146716 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 17 00:36:01.146768 systemd[1]: Stopped dracut-pre-udev.service. May 17 00:36:01.150259 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 17 00:36:01.150293 systemd[1]: Stopped dracut-cmdline.service. May 17 00:36:01.152115 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 17 00:36:01.152160 systemd[1]: Stopped dracut-cmdline-ask.service. May 17 00:36:01.154687 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 17 00:36:01.159506 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 17 00:36:01.159572 systemd[1]: Stopped systemd-vconsole-setup.service. May 17 00:36:01.203000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:01.164986 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 17 00:36:01.165084 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 17 00:36:01.199906 systemd[1]: network-cleanup.service: Deactivated successfully. May 17 00:36:01.200009 systemd[1]: Stopped network-cleanup.service. May 17 00:36:01.367556 systemd[1]: sysroot-boot.service: Deactivated successfully. May 17 00:36:01.367672 systemd[1]: Stopped sysroot-boot.service. May 17 00:36:01.373000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:01.373759 systemd[1]: Reached target initrd-switch-root.target. May 17 00:36:01.377791 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 17 00:36:01.377873 systemd[1]: Stopped initrd-setup-root.service. May 17 00:36:01.383000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:01.384542 systemd[1]: Starting initrd-switch-root.service... May 17 00:36:01.395754 systemd[1]: Switching root. May 17 00:36:01.420240 systemd-journald[183]: Journal stopped May 17 00:36:06.325631 systemd-journald[183]: Received SIGTERM from PID 1 (systemd). May 17 00:36:06.325660 kernel: SELinux: Class mctp_socket not defined in policy. May 17 00:36:06.325673 kernel: SELinux: Class anon_inode not defined in policy. May 17 00:36:06.325683 kernel: SELinux: the above unknown classes and permissions will be allowed May 17 00:36:06.325692 kernel: SELinux: policy capability network_peer_controls=1 May 17 00:36:06.325700 kernel: SELinux: policy capability open_perms=1 May 17 00:36:06.325713 kernel: SELinux: policy capability extended_socket_class=1 May 17 00:36:06.325723 kernel: SELinux: policy capability always_check_network=0 May 17 00:36:06.325733 kernel: SELinux: policy capability cgroup_seclabel=1 May 17 00:36:06.325741 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 17 00:36:06.325751 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 17 00:36:06.325759 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 17 00:36:06.325772 systemd[1]: Successfully loaded SELinux policy in 119.610ms. May 17 00:36:06.325783 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 13.960ms. May 17 00:36:06.325800 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 00:36:06.325811 systemd[1]: Detected virtualization microsoft. May 17 00:36:06.325822 systemd[1]: Detected architecture x86-64. May 17 00:36:06.325833 systemd[1]: Detected first boot. May 17 00:36:06.325848 systemd[1]: Hostname set to . May 17 00:36:06.325859 systemd[1]: Initializing machine ID from random generator. May 17 00:36:06.325869 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 17 00:36:06.325879 systemd[1]: Populated /etc with preset unit settings. May 17 00:36:06.325890 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:36:06.325901 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:36:06.325914 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:36:06.325926 kernel: kauditd_printk_skb: 51 callbacks suppressed May 17 00:36:06.325936 kernel: audit: type=1334 audit(1747442165.837:90): prog-id=12 op=LOAD May 17 00:36:06.325946 kernel: audit: type=1334 audit(1747442165.837:91): prog-id=3 op=UNLOAD May 17 00:36:06.325956 kernel: audit: type=1334 audit(1747442165.842:92): prog-id=13 op=LOAD May 17 00:36:06.325965 kernel: audit: type=1334 audit(1747442165.847:93): prog-id=14 op=LOAD May 17 00:36:06.325977 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 17 00:36:06.325986 kernel: audit: type=1334 audit(1747442165.847:94): prog-id=4 op=UNLOAD May 17 00:36:06.325997 kernel: audit: type=1334 audit(1747442165.847:95): prog-id=5 op=UNLOAD May 17 00:36:06.326010 kernel: audit: type=1131 audit(1747442165.848:96): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:06.326020 systemd[1]: Stopped initrd-switch-root.service. May 17 00:36:06.326032 kernel: audit: type=1334 audit(1747442165.889:97): prog-id=12 op=UNLOAD May 17 00:36:06.326041 kernel: audit: type=1130 audit(1747442165.895:98): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:06.326053 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 17 00:36:06.326062 kernel: audit: type=1131 audit(1747442165.895:99): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:06.326076 systemd[1]: Created slice system-addon\x2dconfig.slice. May 17 00:36:06.326088 systemd[1]: Created slice system-addon\x2drun.slice. May 17 00:36:06.326101 systemd[1]: Created slice system-getty.slice. May 17 00:36:06.326113 systemd[1]: Created slice system-modprobe.slice. May 17 00:36:06.326123 systemd[1]: Created slice system-serial\x2dgetty.slice. May 17 00:36:06.326135 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 17 00:36:06.326145 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 17 00:36:06.326157 systemd[1]: Created slice user.slice. May 17 00:36:06.326170 systemd[1]: Started systemd-ask-password-console.path. May 17 00:36:06.326184 systemd[1]: Started systemd-ask-password-wall.path. May 17 00:36:06.326197 systemd[1]: Set up automount boot.automount. May 17 00:36:06.326208 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 17 00:36:06.326221 systemd[1]: Stopped target initrd-switch-root.target. May 17 00:36:06.326230 systemd[1]: Stopped target initrd-fs.target. May 17 00:36:06.326242 systemd[1]: Stopped target initrd-root-fs.target. May 17 00:36:06.326254 systemd[1]: Reached target integritysetup.target. May 17 00:36:06.326265 systemd[1]: Reached target remote-cryptsetup.target. May 17 00:36:06.326279 systemd[1]: Reached target remote-fs.target. May 17 00:36:06.326291 systemd[1]: Reached target slices.target. May 17 00:36:06.326302 systemd[1]: Reached target swap.target. May 17 00:36:06.326317 systemd[1]: Reached target torcx.target. May 17 00:36:06.326329 systemd[1]: Reached target veritysetup.target. May 17 00:36:06.326341 systemd[1]: Listening on systemd-coredump.socket. May 17 00:36:06.326352 systemd[1]: Listening on systemd-initctl.socket. May 17 00:36:06.326364 systemd[1]: Listening on systemd-networkd.socket. May 17 00:36:06.326378 systemd[1]: Listening on systemd-udevd-control.socket. May 17 00:36:06.326389 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 00:36:06.326398 systemd[1]: Listening on systemd-userdbd.socket. May 17 00:36:06.326418 systemd[1]: Mounting dev-hugepages.mount... May 17 00:36:06.326432 systemd[1]: Mounting dev-mqueue.mount... May 17 00:36:06.326445 systemd[1]: Mounting media.mount... May 17 00:36:06.326460 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:36:06.326473 systemd[1]: Mounting sys-kernel-debug.mount... May 17 00:36:06.326486 systemd[1]: Mounting sys-kernel-tracing.mount... May 17 00:36:06.326499 systemd[1]: Mounting tmp.mount... May 17 00:36:06.326510 systemd[1]: Starting flatcar-tmpfiles.service... May 17 00:36:06.326526 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:36:06.326541 systemd[1]: Starting kmod-static-nodes.service... May 17 00:36:06.326567 systemd[1]: Starting modprobe@configfs.service... May 17 00:36:06.326583 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:36:06.326602 systemd[1]: Starting modprobe@drm.service... May 17 00:36:06.326618 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:36:06.326635 systemd[1]: Starting modprobe@fuse.service... May 17 00:36:06.326652 systemd[1]: Starting modprobe@loop.service... May 17 00:36:06.326669 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 17 00:36:06.326686 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 17 00:36:06.326702 systemd[1]: Stopped systemd-fsck-root.service. May 17 00:36:06.326718 kernel: fuse: init (API version 7.34) May 17 00:36:06.326738 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 17 00:36:06.326756 systemd[1]: Stopped systemd-fsck-usr.service. May 17 00:36:06.326773 systemd[1]: Stopped systemd-journald.service. May 17 00:36:06.326791 kernel: loop: module loaded May 17 00:36:06.326809 systemd[1]: Starting systemd-journald.service... May 17 00:36:06.326827 systemd[1]: Starting systemd-modules-load.service... May 17 00:36:06.326844 systemd[1]: Starting systemd-network-generator.service... May 17 00:36:06.326857 systemd[1]: Starting systemd-remount-fs.service... May 17 00:36:06.326871 systemd[1]: Starting systemd-udev-trigger.service... May 17 00:36:06.326887 systemd[1]: verity-setup.service: Deactivated successfully. May 17 00:36:06.326899 systemd[1]: Stopped verity-setup.service. May 17 00:36:06.326911 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:36:06.326922 systemd[1]: Mounted dev-hugepages.mount. May 17 00:36:06.326934 systemd[1]: Mounted dev-mqueue.mount. May 17 00:36:06.326945 systemd[1]: Mounted media.mount. May 17 00:36:06.326956 systemd[1]: Mounted sys-kernel-debug.mount. May 17 00:36:06.326968 systemd[1]: Mounted sys-kernel-tracing.mount. May 17 00:36:06.326979 systemd[1]: Mounted tmp.mount. May 17 00:36:06.326993 systemd[1]: Finished flatcar-tmpfiles.service. May 17 00:36:06.327004 systemd[1]: Finished kmod-static-nodes.service. May 17 00:36:06.327016 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 17 00:36:06.327032 systemd-journald[1114]: Journal started May 17 00:36:06.327081 systemd-journald[1114]: Runtime Journal (/run/log/journal/b6c0ade7e96b4c2bbd55594e32700028) is 8.0M, max 159.0M, 151.0M free. May 17 00:36:02.102000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 17 00:36:02.342000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 17 00:36:02.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:36:02.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:36:02.347000 audit: BPF prog-id=10 op=LOAD May 17 00:36:02.347000 audit: BPF prog-id=10 op=UNLOAD May 17 00:36:02.347000 audit: BPF prog-id=11 op=LOAD May 17 00:36:02.347000 audit: BPF prog-id=11 op=UNLOAD May 17 00:36:02.754000 audit[1004]: AVC avc: denied { associate } for pid=1004 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 17 00:36:02.754000 audit[1004]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001078c2 a1=c00002ae58 a2=c000029100 a3=32 items=0 ppid=987 pid=1004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:02.754000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:36:02.761000 audit[1004]: AVC avc: denied { associate } for pid=1004 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 17 00:36:02.761000 audit[1004]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c000107999 a2=1ed a3=0 items=2 ppid=987 pid=1004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:02.761000 audit: CWD cwd="/" May 17 00:36:02.761000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:36:02.761000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:36:02.761000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:36:05.837000 audit: BPF prog-id=12 op=LOAD May 17 00:36:05.837000 audit: BPF prog-id=3 op=UNLOAD May 17 00:36:05.842000 audit: BPF prog-id=13 op=LOAD May 17 00:36:05.847000 audit: BPF prog-id=14 op=LOAD May 17 00:36:05.847000 audit: BPF prog-id=4 op=UNLOAD May 17 00:36:05.847000 audit: BPF prog-id=5 op=UNLOAD May 17 00:36:05.848000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:05.889000 audit: BPF prog-id=12 op=UNLOAD May 17 00:36:05.895000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:05.895000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:06.211000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:06.219000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:06.229000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:06.229000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:06.229000 audit: BPF prog-id=15 op=LOAD May 17 00:36:06.230000 audit: BPF prog-id=16 op=LOAD May 17 00:36:06.230000 audit: BPF prog-id=17 op=LOAD May 17 00:36:06.230000 audit: BPF prog-id=13 op=UNLOAD May 17 00:36:06.230000 audit: BPF prog-id=14 op=UNLOAD May 17 00:36:06.278000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:06.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:06.321000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 17 00:36:06.321000 audit[1114]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7fffa74e3080 a2=4000 a3=7fffa74e311c items=0 ppid=1 pid=1114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:06.321000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 17 00:36:06.326000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:02.737930 /usr/lib/systemd/system-generators/torcx-generator[1004]: time="2025-05-17T00:36:02Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:36:05.835778 systemd[1]: Queued start job for default target multi-user.target. May 17 00:36:02.742860 /usr/lib/systemd/system-generators/torcx-generator[1004]: time="2025-05-17T00:36:02Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 17 00:36:05.835790 systemd[1]: Unnecessary job was removed for dev-sda6.device. May 17 00:36:06.334867 systemd[1]: Finished modprobe@configfs.service. May 17 00:36:02.742879 /usr/lib/systemd/system-generators/torcx-generator[1004]: time="2025-05-17T00:36:02Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 17 00:36:05.848275 systemd[1]: systemd-journald.service: Deactivated successfully. May 17 00:36:02.742919 /usr/lib/systemd/system-generators/torcx-generator[1004]: time="2025-05-17T00:36:02Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 17 00:36:02.742930 /usr/lib/systemd/system-generators/torcx-generator[1004]: time="2025-05-17T00:36:02Z" level=debug msg="skipped missing lower profile" missing profile=oem May 17 00:36:02.742973 /usr/lib/systemd/system-generators/torcx-generator[1004]: time="2025-05-17T00:36:02Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 17 00:36:02.742989 /usr/lib/systemd/system-generators/torcx-generator[1004]: time="2025-05-17T00:36:02Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 17 00:36:02.743203 /usr/lib/systemd/system-generators/torcx-generator[1004]: time="2025-05-17T00:36:02Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 17 00:36:02.743245 /usr/lib/systemd/system-generators/torcx-generator[1004]: time="2025-05-17T00:36:02Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 17 00:36:02.743258 /usr/lib/systemd/system-generators/torcx-generator[1004]: time="2025-05-17T00:36:02Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 17 00:36:02.751106 /usr/lib/systemd/system-generators/torcx-generator[1004]: time="2025-05-17T00:36:02Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 17 00:36:02.751156 /usr/lib/systemd/system-generators/torcx-generator[1004]: time="2025-05-17T00:36:02Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 17 00:36:02.751176 /usr/lib/systemd/system-generators/torcx-generator[1004]: time="2025-05-17T00:36:02Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 17 00:36:02.751190 /usr/lib/systemd/system-generators/torcx-generator[1004]: time="2025-05-17T00:36:02Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 17 00:36:02.751208 /usr/lib/systemd/system-generators/torcx-generator[1004]: time="2025-05-17T00:36:02Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 17 00:36:02.751221 /usr/lib/systemd/system-generators/torcx-generator[1004]: time="2025-05-17T00:36:02Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 17 00:36:05.329590 /usr/lib/systemd/system-generators/torcx-generator[1004]: time="2025-05-17T00:36:05Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:36:05.329848 /usr/lib/systemd/system-generators/torcx-generator[1004]: time="2025-05-17T00:36:05Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:36:05.329962 /usr/lib/systemd/system-generators/torcx-generator[1004]: time="2025-05-17T00:36:05Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:36:05.330146 /usr/lib/systemd/system-generators/torcx-generator[1004]: time="2025-05-17T00:36:05Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:36:05.330204 /usr/lib/systemd/system-generators/torcx-generator[1004]: time="2025-05-17T00:36:05Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 17 00:36:05.330263 /usr/lib/systemd/system-generators/torcx-generator[1004]: time="2025-05-17T00:36:05Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 17 00:36:06.336000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:06.336000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:06.342298 systemd[1]: Started systemd-journald.service. May 17 00:36:06.342000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:06.343663 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:36:06.343965 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:36:06.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:06.345000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:06.346517 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 00:36:06.346818 systemd[1]: Finished modprobe@drm.service. May 17 00:36:06.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:06.348000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:06.349299 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:36:06.349656 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:36:06.351000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:06.351000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:06.352500 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 17 00:36:06.352772 systemd[1]: Finished modprobe@fuse.service. May 17 00:36:06.354000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:06.354000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:06.355263 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:36:06.355512 systemd[1]: Finished modprobe@loop.service. May 17 00:36:06.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:06.357000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:06.357944 systemd[1]: Finished systemd-modules-load.service. May 17 00:36:06.359000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:06.360555 systemd[1]: Finished systemd-network-generator.service. May 17 00:36:06.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:06.363245 systemd[1]: Finished systemd-remount-fs.service. May 17 00:36:06.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:06.366390 systemd[1]: Reached target network-pre.target. May 17 00:36:06.370235 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 17 00:36:06.376973 systemd[1]: Mounting sys-kernel-config.mount... May 17 00:36:06.381798 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 17 00:36:06.386695 systemd[1]: Starting systemd-hwdb-update.service... May 17 00:36:06.389626 systemd[1]: Starting systemd-journal-flush.service... May 17 00:36:06.391584 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:36:06.392861 systemd[1]: Starting systemd-random-seed.service... May 17 00:36:06.394485 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:36:06.395876 systemd[1]: Starting systemd-sysctl.service... May 17 00:36:06.399723 systemd[1]: Starting systemd-sysusers.service... May 17 00:36:06.406173 systemd[1]: Finished systemd-udev-trigger.service. May 17 00:36:06.408000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:06.408589 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 17 00:36:06.410956 systemd[1]: Mounted sys-kernel-config.mount. May 17 00:36:06.414472 systemd[1]: Starting systemd-udev-settle.service... May 17 00:36:06.421593 systemd-journald[1114]: Time spent on flushing to /var/log/journal/b6c0ade7e96b4c2bbd55594e32700028 is 30.321ms for 1117 entries. May 17 00:36:06.421593 systemd-journald[1114]: System Journal (/var/log/journal/b6c0ade7e96b4c2bbd55594e32700028) is 8.0M, max 2.6G, 2.6G free. May 17 00:36:06.481450 systemd-journald[1114]: Received client request to flush runtime journal. May 17 00:36:06.435000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:06.455000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:06.482365 udevadm[1128]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. May 17 00:36:06.433650 systemd[1]: Finished systemd-random-seed.service. May 17 00:36:06.438072 systemd[1]: Reached target first-boot-complete.target. May 17 00:36:06.453424 systemd[1]: Finished systemd-sysctl.service. May 17 00:36:06.482541 systemd[1]: Finished systemd-journal-flush.service. May 17 00:36:06.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:06.574096 systemd[1]: Finished systemd-sysusers.service. May 17 00:36:06.575000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:06.989889 systemd[1]: Finished systemd-hwdb-update.service. May 17 00:36:06.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:06.992000 audit: BPF prog-id=18 op=LOAD May 17 00:36:06.992000 audit: BPF prog-id=19 op=LOAD May 17 00:36:06.992000 audit: BPF prog-id=7 op=UNLOAD May 17 00:36:06.992000 audit: BPF prog-id=8 op=UNLOAD May 17 00:36:06.993899 systemd[1]: Starting systemd-udevd.service... May 17 00:36:07.010848 systemd-udevd[1131]: Using default interface naming scheme 'v252'. May 17 00:36:07.159151 systemd[1]: Started systemd-udevd.service. May 17 00:36:07.160000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:07.162000 audit: BPF prog-id=20 op=LOAD May 17 00:36:07.163674 systemd[1]: Starting systemd-networkd.service... May 17 00:36:07.190000 audit: BPF prog-id=21 op=LOAD May 17 00:36:07.190000 audit: BPF prog-id=22 op=LOAD May 17 00:36:07.190000 audit: BPF prog-id=23 op=LOAD May 17 00:36:07.191705 systemd[1]: Starting systemd-userdbd.service... May 17 00:36:07.221148 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 17 00:36:07.248853 systemd[1]: Started systemd-userdbd.service. May 17 00:36:07.251000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:07.298918 kernel: mousedev: PS/2 mouse device common for all mice May 17 00:36:07.328682 kernel: hv_utils: Registering HyperV Utility Driver May 17 00:36:07.328774 kernel: hv_vmbus: registering driver hv_utils May 17 00:36:07.338444 kernel: hv_utils: Shutdown IC version 3.2 May 17 00:36:07.338523 kernel: hv_utils: Heartbeat IC version 3.0 May 17 00:36:07.338543 kernel: hv_utils: TimeSync IC version 4.0 May 17 00:36:07.334000 audit[1144]: AVC avc: denied { confidentiality } for pid=1144 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 17 00:36:07.854342 kernel: hv_vmbus: registering driver hv_balloon May 17 00:36:07.873158 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 May 17 00:36:07.334000 audit[1144]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55a2f59c96f0 a1=f884 a2=7fec486a6bc5 a3=5 items=12 ppid=1131 pid=1144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:07.334000 audit: CWD cwd="/" May 17 00:36:07.334000 audit: PATH item=0 name=(null) inode=1237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:36:07.334000 audit: PATH item=1 name=(null) inode=15663 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:36:07.334000 audit: PATH item=2 name=(null) inode=15663 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:36:07.334000 audit: PATH item=3 name=(null) inode=15664 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:36:07.334000 audit: PATH item=4 name=(null) inode=15663 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:36:07.334000 audit: PATH item=5 name=(null) inode=15665 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:36:07.334000 audit: PATH item=6 name=(null) inode=15663 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:36:07.334000 audit: PATH item=7 name=(null) inode=15666 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:36:07.334000 audit: PATH item=8 name=(null) inode=15663 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:36:07.334000 audit: PATH item=9 name=(null) inode=15667 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:36:07.334000 audit: PATH item=10 name=(null) inode=15663 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:36:07.334000 audit: PATH item=11 name=(null) inode=15668 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:36:07.334000 audit: PROCTITLE proctitle="(udev-worker)" May 17 00:36:07.884338 kernel: hv_vmbus: registering driver hyperv_fb May 17 00:36:07.905081 kernel: hyperv_fb: Synthvid Version major 3, minor 5 May 17 00:36:07.905181 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 May 17 00:36:07.908763 kernel: Console: switching to colour dummy device 80x25 May 17 00:36:07.911224 kernel: Console: switching to colour frame buffer device 128x48 May 17 00:36:07.941323 systemd-networkd[1137]: lo: Link UP May 17 00:36:07.941619 systemd-networkd[1137]: lo: Gained carrier May 17 00:36:07.942309 systemd-networkd[1137]: Enumeration completed May 17 00:36:07.943000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:07.942522 systemd[1]: Started systemd-networkd.service. May 17 00:36:07.946355 systemd[1]: Starting systemd-networkd-wait-online.service... May 17 00:36:07.956476 systemd-networkd[1137]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 00:36:07.993161 kernel: mlx5_core b393:00:02.0 enP45971s1: Link up May 17 00:36:08.012941 systemd-networkd[1137]: enP45971s1: Link UP May 17 00:36:08.013149 kernel: hv_netvsc 6045bdfc-30ed-6045-bdfc-30ed6045bdfc eth0: Data path switched to VF: enP45971s1 May 17 00:36:08.013590 systemd-networkd[1137]: eth0: Link UP May 17 00:36:08.013692 systemd-networkd[1137]: eth0: Gained carrier May 17 00:36:08.020927 systemd-networkd[1137]: enP45971s1: Gained carrier May 17 00:36:08.049692 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 00:36:08.064720 systemd-networkd[1137]: eth0: DHCPv4 address 10.200.4.22/24, gateway 10.200.4.1 acquired from 168.63.129.16 May 17 00:36:08.114163 kernel: KVM: vmx: using Hyper-V Enlightened VMCS May 17 00:36:08.164517 systemd[1]: Finished systemd-udev-settle.service. May 17 00:36:08.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:08.168163 systemd[1]: Starting lvm2-activation-early.service... May 17 00:36:08.280236 lvm[1206]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 00:36:08.307205 systemd[1]: Finished lvm2-activation-early.service. May 17 00:36:08.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:08.309549 systemd[1]: Reached target cryptsetup.target. May 17 00:36:08.312458 systemd[1]: Starting lvm2-activation.service... May 17 00:36:08.318105 lvm[1207]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 00:36:08.336120 systemd[1]: Finished lvm2-activation.service. May 17 00:36:08.337000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:08.338682 systemd[1]: Reached target local-fs-pre.target. May 17 00:36:08.340681 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 17 00:36:08.340717 systemd[1]: Reached target local-fs.target. May 17 00:36:08.342586 systemd[1]: Reached target machines.target. May 17 00:36:08.345665 systemd[1]: Starting ldconfig.service... May 17 00:36:08.351031 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:36:08.351124 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:36:08.352288 systemd[1]: Starting systemd-boot-update.service... May 17 00:36:08.355338 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 17 00:36:08.358884 systemd[1]: Starting systemd-machine-id-commit.service... May 17 00:36:08.362711 systemd[1]: Starting systemd-sysext.service... May 17 00:36:08.372448 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1209 (bootctl) May 17 00:36:08.373821 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 17 00:36:08.884398 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 17 00:36:08.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:08.887977 systemd[1]: Unmounting usr-share-oem.mount... May 17 00:36:08.925289 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 17 00:36:08.925656 systemd[1]: Unmounted usr-share-oem.mount. May 17 00:36:08.947161 kernel: loop0: detected capacity change from 0 to 229808 May 17 00:36:09.021233 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 17 00:36:09.035165 kernel: loop1: detected capacity change from 0 to 229808 May 17 00:36:09.040401 (sd-sysext)[1221]: Using extensions 'kubernetes'. May 17 00:36:09.041012 (sd-sysext)[1221]: Merged extensions into '/usr'. May 17 00:36:09.057472 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:36:09.059191 systemd[1]: Mounting usr-share-oem.mount... May 17 00:36:09.061510 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:36:09.065255 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:36:09.068007 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:36:09.070297 systemd[1]: Starting modprobe@loop.service... May 17 00:36:09.071196 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:36:09.071336 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:36:09.071626 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:36:09.076713 systemd[1]: Mounted usr-share-oem.mount. May 17 00:36:09.079320 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:36:09.079466 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:36:09.080000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.080000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.081897 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:36:09.082041 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:36:09.083000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.083000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.084723 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:36:09.084859 systemd[1]: Finished modprobe@loop.service. May 17 00:36:09.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.085000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.087237 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:36:09.087372 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:36:09.087000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.088910 systemd[1]: Finished systemd-sysext.service. May 17 00:36:09.091683 systemd[1]: Starting ensure-sysext.service... May 17 00:36:09.094540 systemd[1]: Starting systemd-tmpfiles-setup.service... May 17 00:36:09.103585 systemd[1]: Reloading. May 17 00:36:09.161576 systemd-tmpfiles[1228]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 17 00:36:09.179915 /usr/lib/systemd/system-generators/torcx-generator[1248]: time="2025-05-17T00:36:09Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:36:09.179951 /usr/lib/systemd/system-generators/torcx-generator[1248]: time="2025-05-17T00:36:09Z" level=info msg="torcx already run" May 17 00:36:09.191455 systemd-fsck[1218]: fsck.fat 4.2 (2021-01-31) May 17 00:36:09.191455 systemd-fsck[1218]: /dev/sda1: 790 files, 120726/258078 clusters May 17 00:36:09.207848 systemd-tmpfiles[1228]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 17 00:36:09.225478 systemd-tmpfiles[1228]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 17 00:36:09.287275 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:36:09.287296 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:36:09.303307 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:36:09.340327 systemd-networkd[1137]: eth0: Gained IPv6LL May 17 00:36:09.384813 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 17 00:36:09.385000 audit: BPF prog-id=24 op=LOAD May 17 00:36:09.385000 audit: BPF prog-id=20 op=UNLOAD May 17 00:36:09.387000 audit: BPF prog-id=25 op=LOAD May 17 00:36:09.387000 audit: BPF prog-id=15 op=UNLOAD May 17 00:36:09.387000 audit: BPF prog-id=26 op=LOAD May 17 00:36:09.387000 audit: BPF prog-id=27 op=LOAD May 17 00:36:09.387000 audit: BPF prog-id=16 op=UNLOAD May 17 00:36:09.387000 audit: BPF prog-id=17 op=UNLOAD May 17 00:36:09.389000 audit: BPF prog-id=28 op=LOAD May 17 00:36:09.389000 audit: BPF prog-id=29 op=LOAD May 17 00:36:09.389000 audit: BPF prog-id=18 op=UNLOAD May 17 00:36:09.389000 audit: BPF prog-id=19 op=UNLOAD May 17 00:36:09.390000 audit: BPF prog-id=30 op=LOAD May 17 00:36:09.390000 audit: BPF prog-id=21 op=UNLOAD May 17 00:36:09.390000 audit: BPF prog-id=31 op=LOAD May 17 00:36:09.390000 audit: BPF prog-id=32 op=LOAD May 17 00:36:09.390000 audit: BPF prog-id=22 op=UNLOAD May 17 00:36:09.390000 audit: BPF prog-id=23 op=UNLOAD May 17 00:36:09.396264 systemd[1]: Finished systemd-networkd-wait-online.service. May 17 00:36:09.397000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.399369 systemd[1]: Finished systemd-machine-id-commit.service. May 17 00:36:09.400000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.401575 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 17 00:36:09.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.411783 systemd[1]: Mounting boot.mount... May 17 00:36:09.417829 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:36:09.418409 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:36:09.419905 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:36:09.422988 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:36:09.426202 systemd[1]: Starting modprobe@loop.service... May 17 00:36:09.428730 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:36:09.428882 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:36:09.429016 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:36:09.431463 systemd[1]: Mounted boot.mount. May 17 00:36:09.434086 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:36:09.434263 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:36:09.435000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.435000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.436818 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:36:09.436960 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:36:09.437000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.437000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.439454 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:36:09.439603 systemd[1]: Finished modprobe@loop.service. May 17 00:36:09.440000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.440000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.448722 systemd[1]: Finished ensure-sysext.service. May 17 00:36:09.450000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.453957 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:36:09.455337 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:36:09.461337 systemd[1]: Starting modprobe@drm.service... May 17 00:36:09.464571 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:36:09.467775 systemd[1]: Starting modprobe@loop.service... May 17 00:36:09.469746 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:36:09.469838 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:36:09.473000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.471887 systemd[1]: Finished systemd-boot-update.service. May 17 00:36:09.475042 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:36:09.475524 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:36:09.477000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.477000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.479450 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 00:36:09.479741 systemd[1]: Finished modprobe@drm.service. May 17 00:36:09.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.480000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.482213 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:36:09.482508 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:36:09.483000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.483000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.485282 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:36:09.485572 systemd[1]: Finished modprobe@loop.service. May 17 00:36:09.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.487000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.488775 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:36:09.488831 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:36:09.541499 systemd[1]: Finished systemd-tmpfiles-setup.service. May 17 00:36:09.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.545263 systemd[1]: Starting audit-rules.service... May 17 00:36:09.548597 systemd[1]: Starting clean-ca-certificates.service... May 17 00:36:09.552328 systemd[1]: Starting systemd-journal-catalog-update.service... May 17 00:36:09.554000 audit: BPF prog-id=33 op=LOAD May 17 00:36:09.556746 systemd[1]: Starting systemd-resolved.service... May 17 00:36:09.560000 audit: BPF prog-id=34 op=LOAD May 17 00:36:09.562447 systemd[1]: Starting systemd-timesyncd.service... May 17 00:36:09.565770 systemd[1]: Starting systemd-update-utmp.service... May 17 00:36:09.571439 systemd[1]: Finished clean-ca-certificates.service. May 17 00:36:09.572000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.573737 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 00:36:09.583000 audit[1328]: SYSTEM_BOOT pid=1328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 17 00:36:09.588710 systemd[1]: Finished systemd-update-utmp.service. May 17 00:36:09.589000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.641000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.640572 systemd[1]: Finished systemd-journal-catalog-update.service. May 17 00:36:09.681052 systemd[1]: Started systemd-timesyncd.service. May 17 00:36:09.682000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.683336 systemd[1]: Reached target time-set.target. May 17 00:36:09.693450 systemd-resolved[1326]: Positive Trust Anchors: May 17 00:36:09.693468 systemd-resolved[1326]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 00:36:09.693507 systemd-resolved[1326]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 00:36:09.699000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 17 00:36:09.699000 audit[1343]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc0a063a20 a2=420 a3=0 items=0 ppid=1322 pid=1343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.699000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 17 00:36:09.700798 augenrules[1343]: No rules May 17 00:36:09.701587 systemd[1]: Finished audit-rules.service. May 17 00:36:09.728219 systemd-timesyncd[1327]: Contacted time server 185.53.45.5:123 (0.flatcar.pool.ntp.org). May 17 00:36:09.728279 systemd-timesyncd[1327]: Initial clock synchronization to Sat 2025-05-17 00:36:09.729792 UTC. May 17 00:36:09.728722 systemd-resolved[1326]: Using system hostname 'ci-3510.3.7-n-a14653f0ea'. May 17 00:36:09.730180 systemd[1]: Started systemd-resolved.service. May 17 00:36:09.732618 systemd[1]: Reached target network.target. May 17 00:36:09.734613 systemd[1]: Reached target network-online.target. May 17 00:36:09.736539 systemd[1]: Reached target nss-lookup.target. May 17 00:36:09.923921 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:36:09.923956 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:36:11.225437 ldconfig[1208]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 17 00:36:11.239456 systemd[1]: Finished ldconfig.service. May 17 00:36:11.242951 systemd[1]: Starting systemd-update-done.service... May 17 00:36:11.251678 systemd[1]: Finished systemd-update-done.service. May 17 00:36:11.254669 systemd[1]: Reached target sysinit.target. May 17 00:36:11.257718 systemd[1]: Started motdgen.path. May 17 00:36:11.260065 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 17 00:36:11.263936 systemd[1]: Started logrotate.timer. May 17 00:36:11.266666 systemd[1]: Started mdadm.timer. May 17 00:36:11.269089 systemd[1]: Started systemd-tmpfiles-clean.timer. May 17 00:36:11.271632 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 17 00:36:11.271674 systemd[1]: Reached target paths.target. May 17 00:36:11.273365 systemd[1]: Reached target timers.target. May 17 00:36:11.275609 systemd[1]: Listening on dbus.socket. May 17 00:36:11.278186 systemd[1]: Starting docker.socket... May 17 00:36:11.282078 systemd[1]: Listening on sshd.socket. May 17 00:36:11.283604 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:36:11.284066 systemd[1]: Listening on docker.socket. May 17 00:36:11.285561 systemd[1]: Reached target sockets.target. May 17 00:36:11.288822 systemd[1]: Reached target basic.target. May 17 00:36:11.290983 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 00:36:11.291016 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 00:36:11.292191 systemd[1]: Starting containerd.service... May 17 00:36:11.295555 systemd[1]: Starting dbus.service... May 17 00:36:11.298361 systemd[1]: Starting enable-oem-cloudinit.service... May 17 00:36:11.301834 systemd[1]: Starting extend-filesystems.service... May 17 00:36:11.303727 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 17 00:36:11.306448 systemd[1]: Starting kubelet.service... May 17 00:36:11.312200 systemd[1]: Starting motdgen.service... May 17 00:36:11.315311 systemd[1]: Started nvidia.service. May 17 00:36:11.318740 systemd[1]: Starting ssh-key-proc-cmdline.service... May 17 00:36:11.322651 systemd[1]: Starting sshd-keygen.service... May 17 00:36:11.327744 systemd[1]: Starting systemd-logind.service... May 17 00:36:11.329773 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:36:11.329876 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 17 00:36:11.330628 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 17 00:36:11.331616 systemd[1]: Starting update-engine.service... May 17 00:36:11.335726 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 17 00:36:11.343183 jq[1364]: true May 17 00:36:11.342952 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 17 00:36:11.343697 systemd[1]: Finished ssh-key-proc-cmdline.service. May 17 00:36:11.366480 jq[1353]: false May 17 00:36:11.365987 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 17 00:36:11.366253 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 17 00:36:11.371723 jq[1370]: true May 17 00:36:11.399635 extend-filesystems[1354]: Found loop1 May 17 00:36:11.402161 extend-filesystems[1354]: Found sda May 17 00:36:11.404244 extend-filesystems[1354]: Found sda1 May 17 00:36:11.406371 extend-filesystems[1354]: Found sda2 May 17 00:36:11.406371 extend-filesystems[1354]: Found sda3 May 17 00:36:11.406371 extend-filesystems[1354]: Found usr May 17 00:36:11.406371 extend-filesystems[1354]: Found sda4 May 17 00:36:11.406371 extend-filesystems[1354]: Found sda6 May 17 00:36:11.406371 extend-filesystems[1354]: Found sda7 May 17 00:36:11.406371 extend-filesystems[1354]: Found sda9 May 17 00:36:11.406371 extend-filesystems[1354]: Checking size of /dev/sda9 May 17 00:36:11.408412 systemd[1]: motdgen.service: Deactivated successfully. May 17 00:36:11.408632 systemd[1]: Finished motdgen.service. May 17 00:36:11.460618 extend-filesystems[1354]: Old size kept for /dev/sda9 May 17 00:36:11.460618 extend-filesystems[1354]: Found sr0 May 17 00:36:11.461077 systemd[1]: extend-filesystems.service: Deactivated successfully. May 17 00:36:11.461324 systemd[1]: Finished extend-filesystems.service. May 17 00:36:11.477546 dbus-daemon[1352]: [system] SELinux support is enabled May 17 00:36:11.477744 systemd[1]: Started dbus.service. May 17 00:36:11.482658 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 17 00:36:11.482692 systemd[1]: Reached target system-config.target. May 17 00:36:11.484820 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 17 00:36:11.484842 systemd[1]: Reached target user-config.target. May 17 00:36:11.498303 systemd-logind[1362]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 17 00:36:11.503750 systemd-logind[1362]: New seat seat0. May 17 00:36:11.509993 systemd[1]: Started systemd-logind.service. May 17 00:36:11.539263 bash[1406]: Updated "/home/core/.ssh/authorized_keys" May 17 00:36:11.540072 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 17 00:36:11.559441 env[1373]: time="2025-05-17T00:36:11.559030230Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 17 00:36:11.631745 env[1373]: time="2025-05-17T00:36:11.631693319Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 17 00:36:11.632921 env[1373]: time="2025-05-17T00:36:11.631887439Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 17 00:36:11.634529 update_engine[1363]: I0517 00:36:11.633289 1363 main.cc:92] Flatcar Update Engine starting May 17 00:36:11.636554 env[1373]: time="2025-05-17T00:36:11.636511596Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.182-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 17 00:36:11.636554 env[1373]: time="2025-05-17T00:36:11.636553500Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 17 00:36:11.637705 env[1373]: time="2025-05-17T00:36:11.637027947Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 00:36:11.637705 env[1373]: time="2025-05-17T00:36:11.637060951Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 17 00:36:11.637705 env[1373]: time="2025-05-17T00:36:11.637080252Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 17 00:36:11.637705 env[1373]: time="2025-05-17T00:36:11.637096354Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 17 00:36:11.637705 env[1373]: time="2025-05-17T00:36:11.637212366Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 17 00:36:11.637705 env[1373]: time="2025-05-17T00:36:11.637467791Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 17 00:36:11.637705 env[1373]: time="2025-05-17T00:36:11.637660610Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 00:36:11.637705 env[1373]: time="2025-05-17T00:36:11.637681912Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 17 00:36:11.638030 env[1373]: time="2025-05-17T00:36:11.637744018Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 17 00:36:11.638030 env[1373]: time="2025-05-17T00:36:11.637760120Z" level=info msg="metadata content store policy set" policy=shared May 17 00:36:11.647702 systemd[1]: Started update-engine.service. May 17 00:36:11.650118 update_engine[1363]: I0517 00:36:11.649474 1363 update_check_scheduler.cc:74] Next update check in 11m4s May 17 00:36:11.652418 systemd[1]: Started locksmithd.service. May 17 00:36:11.656745 systemd[1]: nvidia.service: Deactivated successfully. May 17 00:36:11.661453 env[1373]: time="2025-05-17T00:36:11.661414760Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 17 00:36:11.661533 env[1373]: time="2025-05-17T00:36:11.661467865Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 17 00:36:11.661533 env[1373]: time="2025-05-17T00:36:11.661489267Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 17 00:36:11.661628 env[1373]: time="2025-05-17T00:36:11.661541073Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 17 00:36:11.661628 env[1373]: time="2025-05-17T00:36:11.661565675Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 17 00:36:11.661707 env[1373]: time="2025-05-17T00:36:11.661643583Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 17 00:36:11.661707 env[1373]: time="2025-05-17T00:36:11.661664485Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 17 00:36:11.661707 env[1373]: time="2025-05-17T00:36:11.661685087Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 17 00:36:11.661807 env[1373]: time="2025-05-17T00:36:11.661704489Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 17 00:36:11.661807 env[1373]: time="2025-05-17T00:36:11.661723791Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 17 00:36:11.661807 env[1373]: time="2025-05-17T00:36:11.661742793Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 17 00:36:11.661807 env[1373]: time="2025-05-17T00:36:11.661762294Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 17 00:36:11.661947 env[1373]: time="2025-05-17T00:36:11.661894808Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 17 00:36:11.662949 env[1373]: time="2025-05-17T00:36:11.661990817Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 17 00:36:11.662949 env[1373]: time="2025-05-17T00:36:11.662453363Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 17 00:36:11.662949 env[1373]: time="2025-05-17T00:36:11.662489666Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 17 00:36:11.662949 env[1373]: time="2025-05-17T00:36:11.662510869Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 17 00:36:11.662949 env[1373]: time="2025-05-17T00:36:11.662578775Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 17 00:36:11.662949 env[1373]: time="2025-05-17T00:36:11.662597177Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 17 00:36:11.662949 env[1373]: time="2025-05-17T00:36:11.662615179Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 17 00:36:11.662949 env[1373]: time="2025-05-17T00:36:11.662688686Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 17 00:36:11.662949 env[1373]: time="2025-05-17T00:36:11.662708088Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 17 00:36:11.662949 env[1373]: time="2025-05-17T00:36:11.662726190Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 17 00:36:11.662949 env[1373]: time="2025-05-17T00:36:11.662748892Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 17 00:36:11.662949 env[1373]: time="2025-05-17T00:36:11.662765594Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 17 00:36:11.662949 env[1373]: time="2025-05-17T00:36:11.662785296Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 17 00:36:11.662949 env[1373]: time="2025-05-17T00:36:11.662924009Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 17 00:36:11.662949 env[1373]: time="2025-05-17T00:36:11.662945011Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 17 00:36:11.663516 env[1373]: time="2025-05-17T00:36:11.662960413Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 17 00:36:11.663516 env[1373]: time="2025-05-17T00:36:11.662994716Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 17 00:36:11.663516 env[1373]: time="2025-05-17T00:36:11.663018819Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 17 00:36:11.663516 env[1373]: time="2025-05-17T00:36:11.663035520Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 17 00:36:11.663516 env[1373]: time="2025-05-17T00:36:11.663063623Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 17 00:36:11.663516 env[1373]: time="2025-05-17T00:36:11.663111428Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 17 00:36:11.663734 env[1373]: time="2025-05-17T00:36:11.663441961Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 17 00:36:11.663734 env[1373]: time="2025-05-17T00:36:11.663516368Z" level=info msg="Connect containerd service" May 17 00:36:11.663734 env[1373]: time="2025-05-17T00:36:11.663555972Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 17 00:36:11.674034 env[1373]: time="2025-05-17T00:36:11.664425258Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 17 00:36:11.674034 env[1373]: time="2025-05-17T00:36:11.664743389Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 17 00:36:11.674034 env[1373]: time="2025-05-17T00:36:11.664803895Z" level=info msg=serving... address=/run/containerd/containerd.sock May 17 00:36:11.674034 env[1373]: time="2025-05-17T00:36:11.666009615Z" level=info msg="containerd successfully booted in 0.109917s" May 17 00:36:11.664932 systemd[1]: Started containerd.service. May 17 00:36:11.674302 env[1373]: time="2025-05-17T00:36:11.674163121Z" level=info msg="Start subscribing containerd event" May 17 00:36:11.674486 env[1373]: time="2025-05-17T00:36:11.674460751Z" level=info msg="Start recovering state" May 17 00:36:11.679503 env[1373]: time="2025-05-17T00:36:11.674652370Z" level=info msg="Start event monitor" May 17 00:36:11.679605 env[1373]: time="2025-05-17T00:36:11.679519251Z" level=info msg="Start snapshots syncer" May 17 00:36:11.679657 env[1373]: time="2025-05-17T00:36:11.679631662Z" level=info msg="Start cni network conf syncer for default" May 17 00:36:11.679657 env[1373]: time="2025-05-17T00:36:11.679647564Z" level=info msg="Start streaming server" May 17 00:36:12.337310 locksmithd[1427]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 17 00:36:12.623514 systemd[1]: Started kubelet.service. May 17 00:36:13.296734 kubelet[1461]: E0517 00:36:13.296687 1461 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:36:13.299104 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:36:13.299275 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:36:13.299535 systemd[1]: kubelet.service: Consumed 1.202s CPU time. May 17 00:36:14.083009 sshd_keygen[1371]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 17 00:36:14.103120 systemd[1]: Finished sshd-keygen.service. May 17 00:36:14.107044 systemd[1]: Starting issuegen.service... May 17 00:36:14.110414 systemd[1]: Started waagent.service. May 17 00:36:14.116862 systemd[1]: issuegen.service: Deactivated successfully. May 17 00:36:14.117003 systemd[1]: Finished issuegen.service. May 17 00:36:14.120594 systemd[1]: Starting systemd-user-sessions.service... May 17 00:36:14.130304 systemd[1]: Finished systemd-user-sessions.service. May 17 00:36:14.134380 systemd[1]: Started getty@tty1.service. May 17 00:36:14.138115 systemd[1]: Started serial-getty@ttyS0.service. May 17 00:36:14.141689 systemd[1]: Reached target getty.target. May 17 00:36:14.143831 systemd[1]: Reached target multi-user.target. May 17 00:36:14.147744 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 17 00:36:14.161436 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 17 00:36:14.161618 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 17 00:36:14.164305 systemd[1]: Startup finished in 580ms (firmware) + 7.490s (loader) + 873ms (kernel) + 7.191s (initrd) + 11.744s (userspace) = 27.881s. May 17 00:36:14.310029 login[1481]: pam_lastlog(login:session): file /var/log/lastlog is locked/write May 17 00:36:14.313909 login[1480]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) May 17 00:36:14.331955 systemd[1]: Created slice user-500.slice. May 17 00:36:14.333760 systemd[1]: Starting user-runtime-dir@500.service... May 17 00:36:14.337237 systemd-logind[1362]: New session 2 of user core. May 17 00:36:14.345385 systemd[1]: Finished user-runtime-dir@500.service. May 17 00:36:14.347779 systemd[1]: Starting user@500.service... May 17 00:36:14.351778 (systemd)[1485]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 17 00:36:14.488405 systemd[1485]: Queued start job for default target default.target. May 17 00:36:14.489300 systemd[1485]: Reached target paths.target. May 17 00:36:14.489329 systemd[1485]: Reached target sockets.target. May 17 00:36:14.489346 systemd[1485]: Reached target timers.target. May 17 00:36:14.489361 systemd[1485]: Reached target basic.target. May 17 00:36:14.489417 systemd[1485]: Reached target default.target. May 17 00:36:14.489458 systemd[1485]: Startup finished in 130ms. May 17 00:36:14.489565 systemd[1]: Started user@500.service. May 17 00:36:14.491274 systemd[1]: Started session-2.scope. May 17 00:36:15.312602 login[1481]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) May 17 00:36:15.318914 systemd[1]: Started session-1.scope. May 17 00:36:15.320196 systemd-logind[1362]: New session 1 of user core. May 17 00:36:16.473673 waagent[1475]: 2025-05-17T00:36:16.473555Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 May 17 00:36:16.485943 waagent[1475]: 2025-05-17T00:36:16.485851Z INFO Daemon Daemon OS: flatcar 3510.3.7 May 17 00:36:16.488465 waagent[1475]: 2025-05-17T00:36:16.488393Z INFO Daemon Daemon Python: 3.9.16 May 17 00:36:16.491039 waagent[1475]: 2025-05-17T00:36:16.490959Z INFO Daemon Daemon Run daemon May 17 00:36:16.493442 waagent[1475]: 2025-05-17T00:36:16.493300Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.7' May 17 00:36:16.504621 waagent[1475]: 2025-05-17T00:36:16.504507Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. May 17 00:36:16.512298 waagent[1475]: 2025-05-17T00:36:16.512187Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' May 17 00:36:16.516786 waagent[1475]: 2025-05-17T00:36:16.516722Z INFO Daemon Daemon cloud-init is enabled: False May 17 00:36:16.519262 waagent[1475]: 2025-05-17T00:36:16.519203Z INFO Daemon Daemon Using waagent for provisioning May 17 00:36:16.522311 waagent[1475]: 2025-05-17T00:36:16.522253Z INFO Daemon Daemon Activate resource disk May 17 00:36:16.524578 waagent[1475]: 2025-05-17T00:36:16.524519Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb May 17 00:36:16.534453 waagent[1475]: 2025-05-17T00:36:16.534389Z INFO Daemon Daemon Found device: None May 17 00:36:16.536770 waagent[1475]: 2025-05-17T00:36:16.536705Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology May 17 00:36:16.540655 waagent[1475]: 2025-05-17T00:36:16.540595Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 May 17 00:36:16.546133 waagent[1475]: 2025-05-17T00:36:16.546069Z INFO Daemon Daemon Clean protocol and wireserver endpoint May 17 00:36:16.549026 waagent[1475]: 2025-05-17T00:36:16.548966Z INFO Daemon Daemon Running default provisioning handler May 17 00:36:16.559557 waagent[1475]: 2025-05-17T00:36:16.559427Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. May 17 00:36:16.565918 waagent[1475]: 2025-05-17T00:36:16.565801Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' May 17 00:36:16.574200 waagent[1475]: 2025-05-17T00:36:16.566307Z INFO Daemon Daemon cloud-init is enabled: False May 17 00:36:16.574200 waagent[1475]: 2025-05-17T00:36:16.567127Z INFO Daemon Daemon Copying ovf-env.xml May 17 00:36:16.609022 waagent[1475]: 2025-05-17T00:36:16.608860Z INFO Daemon Daemon Successfully mounted dvd May 17 00:36:16.644377 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. May 17 00:36:16.671116 waagent[1475]: 2025-05-17T00:36:16.670970Z INFO Daemon Daemon Detect protocol endpoint May 17 00:36:16.680489 waagent[1475]: 2025-05-17T00:36:16.671672Z INFO Daemon Daemon Clean protocol and wireserver endpoint May 17 00:36:16.680489 waagent[1475]: 2025-05-17T00:36:16.672710Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler May 17 00:36:16.680489 waagent[1475]: 2025-05-17T00:36:16.673532Z INFO Daemon Daemon Test for route to 168.63.129.16 May 17 00:36:16.680489 waagent[1475]: 2025-05-17T00:36:16.674627Z INFO Daemon Daemon Route to 168.63.129.16 exists May 17 00:36:16.680489 waagent[1475]: 2025-05-17T00:36:16.675334Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 May 17 00:36:16.714012 waagent[1475]: 2025-05-17T00:36:16.713933Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 May 17 00:36:16.720946 waagent[1475]: 2025-05-17T00:36:16.714883Z INFO Daemon Daemon Wire protocol version:2012-11-30 May 17 00:36:16.720946 waagent[1475]: 2025-05-17T00:36:16.715572Z INFO Daemon Daemon Server preferred version:2015-04-05 May 17 00:36:17.960172 waagent[1475]: 2025-05-17T00:36:17.960013Z INFO Daemon Daemon Initializing goal state during protocol detection May 17 00:36:17.968566 waagent[1475]: 2025-05-17T00:36:17.968492Z INFO Daemon Daemon Forcing an update of the goal state.. May 17 00:36:17.973352 waagent[1475]: 2025-05-17T00:36:17.968866Z INFO Daemon Daemon Fetching goal state [incarnation 1] May 17 00:36:18.028756 waagent[1475]: 2025-05-17T00:36:18.028623Z INFO Daemon Daemon Found private key matching thumbprint 37D689E4089787FB3EAA3D5DBC84C88ECF57F2E3 May 17 00:36:18.033011 waagent[1475]: 2025-05-17T00:36:18.032928Z INFO Daemon Daemon Fetch goal state completed May 17 00:36:18.053994 waagent[1475]: 2025-05-17T00:36:18.053924Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 46b7c0c2-ddc7-4a4e-884c-12f06849da18 New eTag: 16042125228718687757] May 17 00:36:18.059177 waagent[1475]: 2025-05-17T00:36:18.059087Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob May 17 00:36:18.071362 waagent[1475]: 2025-05-17T00:36:18.071293Z INFO Daemon Daemon Starting provisioning May 17 00:36:18.073919 waagent[1475]: 2025-05-17T00:36:18.073849Z INFO Daemon Daemon Handle ovf-env.xml. May 17 00:36:18.076279 waagent[1475]: 2025-05-17T00:36:18.076215Z INFO Daemon Daemon Set hostname [ci-3510.3.7-n-a14653f0ea] May 17 00:36:18.085709 waagent[1475]: 2025-05-17T00:36:18.085593Z INFO Daemon Daemon Publish hostname [ci-3510.3.7-n-a14653f0ea] May 17 00:36:18.089049 waagent[1475]: 2025-05-17T00:36:18.088969Z INFO Daemon Daemon Examine /proc/net/route for primary interface May 17 00:36:18.092161 waagent[1475]: 2025-05-17T00:36:18.092083Z INFO Daemon Daemon Primary interface is [eth0] May 17 00:36:18.106741 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. May 17 00:36:18.106995 systemd[1]: Stopped systemd-networkd-wait-online.service. May 17 00:36:18.107066 systemd[1]: Stopping systemd-networkd-wait-online.service... May 17 00:36:18.107391 systemd[1]: Stopping systemd-networkd.service... May 17 00:36:18.113191 systemd-networkd[1137]: eth0: DHCPv6 lease lost May 17 00:36:18.114574 systemd[1]: systemd-networkd.service: Deactivated successfully. May 17 00:36:18.114729 systemd[1]: Stopped systemd-networkd.service. May 17 00:36:18.117398 systemd[1]: Starting systemd-networkd.service... May 17 00:36:18.149046 systemd-networkd[1526]: enP45971s1: Link UP May 17 00:36:18.149057 systemd-networkd[1526]: enP45971s1: Gained carrier May 17 00:36:18.150414 systemd-networkd[1526]: eth0: Link UP May 17 00:36:18.150423 systemd-networkd[1526]: eth0: Gained carrier May 17 00:36:18.150843 systemd-networkd[1526]: lo: Link UP May 17 00:36:18.150852 systemd-networkd[1526]: lo: Gained carrier May 17 00:36:18.151184 systemd-networkd[1526]: eth0: Gained IPv6LL May 17 00:36:18.151467 systemd-networkd[1526]: Enumeration completed May 17 00:36:18.151597 systemd[1]: Started systemd-networkd.service. May 17 00:36:18.153682 systemd[1]: Starting systemd-networkd-wait-online.service... May 17 00:36:18.158432 waagent[1475]: 2025-05-17T00:36:18.158262Z INFO Daemon Daemon Create user account if not exists May 17 00:36:18.161614 waagent[1475]: 2025-05-17T00:36:18.161508Z INFO Daemon Daemon User core already exists, skip useradd May 17 00:36:18.162580 systemd-networkd[1526]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 00:36:18.164601 waagent[1475]: 2025-05-17T00:36:18.164523Z INFO Daemon Daemon Configure sudoer May 17 00:36:18.167159 waagent[1475]: 2025-05-17T00:36:18.167081Z INFO Daemon Daemon Configure sshd May 17 00:36:18.169503 waagent[1475]: 2025-05-17T00:36:18.169423Z INFO Daemon Daemon Deploy ssh public key. May 17 00:36:18.197272 systemd-networkd[1526]: eth0: DHCPv4 address 10.200.4.22/24, gateway 10.200.4.1 acquired from 168.63.129.16 May 17 00:36:18.201711 systemd[1]: Finished systemd-networkd-wait-online.service. May 17 00:36:19.245304 waagent[1475]: 2025-05-17T00:36:19.245188Z INFO Daemon Daemon Provisioning complete May 17 00:36:19.256951 waagent[1475]: 2025-05-17T00:36:19.256876Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping May 17 00:36:19.263378 waagent[1475]: 2025-05-17T00:36:19.257366Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. May 17 00:36:19.263378 waagent[1475]: 2025-05-17T00:36:19.259192Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent May 17 00:36:19.531116 waagent[1532]: 2025-05-17T00:36:19.530934Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent May 17 00:36:19.531852 waagent[1532]: 2025-05-17T00:36:19.531783Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 00:36:19.532005 waagent[1532]: 2025-05-17T00:36:19.531948Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 00:36:19.542941 waagent[1532]: 2025-05-17T00:36:19.542851Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. May 17 00:36:19.543125 waagent[1532]: 2025-05-17T00:36:19.543067Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] May 17 00:36:19.596894 waagent[1532]: 2025-05-17T00:36:19.596761Z INFO ExtHandler ExtHandler Found private key matching thumbprint 37D689E4089787FB3EAA3D5DBC84C88ECF57F2E3 May 17 00:36:19.597224 waagent[1532]: 2025-05-17T00:36:19.597157Z INFO ExtHandler ExtHandler Fetch goal state completed May 17 00:36:19.610583 waagent[1532]: 2025-05-17T00:36:19.610515Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: 4067edb2-f64e-467f-b9c9-4e2ed700c9fb New eTag: 16042125228718687757] May 17 00:36:19.611125 waagent[1532]: 2025-05-17T00:36:19.611064Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob May 17 00:36:19.654226 waagent[1532]: 2025-05-17T00:36:19.654053Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.7; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; May 17 00:36:19.668043 waagent[1532]: 2025-05-17T00:36:19.667947Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1532 May 17 00:36:19.671493 waagent[1532]: 2025-05-17T00:36:19.671419Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.7', '', 'Flatcar Container Linux by Kinvolk'] May 17 00:36:19.672670 waagent[1532]: 2025-05-17T00:36:19.672607Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules May 17 00:36:19.704355 waagent[1532]: 2025-05-17T00:36:19.704286Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service May 17 00:36:19.704770 waagent[1532]: 2025-05-17T00:36:19.704705Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup May 17 00:36:19.712869 waagent[1532]: 2025-05-17T00:36:19.712809Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now May 17 00:36:19.713377 waagent[1532]: 2025-05-17T00:36:19.713317Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' May 17 00:36:19.714436 waagent[1532]: 2025-05-17T00:36:19.714373Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] May 17 00:36:19.715708 waagent[1532]: 2025-05-17T00:36:19.715650Z INFO ExtHandler ExtHandler Starting env monitor service. May 17 00:36:19.716117 waagent[1532]: 2025-05-17T00:36:19.716061Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 00:36:19.716284 waagent[1532]: 2025-05-17T00:36:19.716235Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 00:36:19.716796 waagent[1532]: 2025-05-17T00:36:19.716740Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. May 17 00:36:19.717075 waagent[1532]: 2025-05-17T00:36:19.717018Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: May 17 00:36:19.717075 waagent[1532]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT May 17 00:36:19.717075 waagent[1532]: eth0 00000000 0104C80A 0003 0 0 1024 00000000 0 0 0 May 17 00:36:19.717075 waagent[1532]: eth0 0004C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 May 17 00:36:19.717075 waagent[1532]: eth0 0104C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 May 17 00:36:19.717075 waagent[1532]: eth0 10813FA8 0104C80A 0007 0 0 1024 FFFFFFFF 0 0 0 May 17 00:36:19.717075 waagent[1532]: eth0 FEA9FEA9 0104C80A 0007 0 0 1024 FFFFFFFF 0 0 0 May 17 00:36:19.720277 waagent[1532]: 2025-05-17T00:36:19.720021Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. May 17 00:36:19.720414 waagent[1532]: 2025-05-17T00:36:19.720347Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 00:36:19.720842 waagent[1532]: 2025-05-17T00:36:19.720789Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 00:36:19.721565 waagent[1532]: 2025-05-17T00:36:19.721508Z INFO EnvHandler ExtHandler Configure routes May 17 00:36:19.721852 waagent[1532]: 2025-05-17T00:36:19.721798Z INFO EnvHandler ExtHandler Gateway:None May 17 00:36:19.722456 waagent[1532]: 2025-05-17T00:36:19.722403Z INFO EnvHandler ExtHandler Routes:None May 17 00:36:19.723501 waagent[1532]: 2025-05-17T00:36:19.723436Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread May 17 00:36:19.723640 waagent[1532]: 2025-05-17T00:36:19.723587Z INFO ExtHandler ExtHandler Start Extension Telemetry service. May 17 00:36:19.724207 waagent[1532]: 2025-05-17T00:36:19.724130Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True May 17 00:36:19.724298 waagent[1532]: 2025-05-17T00:36:19.724239Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. May 17 00:36:19.724669 waagent[1532]: 2025-05-17T00:36:19.724620Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread May 17 00:36:19.745602 waagent[1532]: 2025-05-17T00:36:19.745535Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) May 17 00:36:19.745897 waagent[1532]: 2025-05-17T00:36:19.745836Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1526' May 17 00:36:19.747688 waagent[1532]: 2025-05-17T00:36:19.747633Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required May 17 00:36:19.749293 waagent[1532]: 2025-05-17T00:36:19.749234Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' May 17 00:36:19.768781 waagent[1532]: 2025-05-17T00:36:19.768650Z INFO MonitorHandler ExtHandler Network interfaces: May 17 00:36:19.768781 waagent[1532]: Executing ['ip', '-a', '-o', 'link']: May 17 00:36:19.768781 waagent[1532]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 May 17 00:36:19.768781 waagent[1532]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 60:45:bd:fc:30:ed brd ff:ff:ff:ff:ff:ff May 17 00:36:19.768781 waagent[1532]: 3: enP45971s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 60:45:bd:fc:30:ed brd ff:ff:ff:ff:ff:ff\ altname enP45971p0s2 May 17 00:36:19.768781 waagent[1532]: Executing ['ip', '-4', '-a', '-o', 'address']: May 17 00:36:19.768781 waagent[1532]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever May 17 00:36:19.768781 waagent[1532]: 2: eth0 inet 10.200.4.22/24 metric 1024 brd 10.200.4.255 scope global eth0\ valid_lft forever preferred_lft forever May 17 00:36:19.768781 waagent[1532]: Executing ['ip', '-6', '-a', '-o', 'address']: May 17 00:36:19.768781 waagent[1532]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever May 17 00:36:19.768781 waagent[1532]: 2: eth0 inet6 fe80::6245:bdff:fefc:30ed/64 scope link \ valid_lft forever preferred_lft forever May 17 00:36:19.794934 waagent[1532]: 2025-05-17T00:36:19.781637Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. May 17 00:36:19.943159 waagent[1532]: 2025-05-17T00:36:19.943007Z INFO EnvHandler ExtHandler Successfully added Azure fabric firewall rules May 17 00:36:19.946419 waagent[1532]: 2025-05-17T00:36:19.946255Z INFO EnvHandler ExtHandler Firewall rules: May 17 00:36:19.946419 waagent[1532]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) May 17 00:36:19.946419 waagent[1532]: pkts bytes target prot opt in out source destination May 17 00:36:19.946419 waagent[1532]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) May 17 00:36:19.946419 waagent[1532]: pkts bytes target prot opt in out source destination May 17 00:36:19.946419 waagent[1532]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) May 17 00:36:19.946419 waagent[1532]: pkts bytes target prot opt in out source destination May 17 00:36:19.946419 waagent[1532]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 May 17 00:36:19.946419 waagent[1532]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW May 17 00:36:19.948766 waagent[1532]: 2025-05-17T00:36:19.948678Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 May 17 00:36:20.015765 waagent[1532]: 2025-05-17T00:36:20.015691Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.13.1.1 -- exiting May 17 00:36:20.263190 waagent[1475]: 2025-05-17T00:36:20.262999Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running May 17 00:36:20.267613 waagent[1475]: 2025-05-17T00:36:20.267551Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.13.1.1 to be the latest agent May 17 00:36:21.327494 waagent[1573]: 2025-05-17T00:36:21.327384Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.13.1.1) May 17 00:36:21.328765 waagent[1573]: 2025-05-17T00:36:21.328697Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.7 May 17 00:36:21.328907 waagent[1573]: 2025-05-17T00:36:21.328853Z INFO ExtHandler ExtHandler Python: 3.9.16 May 17 00:36:21.329051 waagent[1573]: 2025-05-17T00:36:21.329006Z INFO ExtHandler ExtHandler CPU Arch: x86_64 May 17 00:36:21.344232 waagent[1573]: 2025-05-17T00:36:21.344110Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.7; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; Arch: x86_64; systemd: True; systemd_version: systemd 252 (252); LISDrivers: Absent; logrotate: logrotate 3.20.1; May 17 00:36:21.344620 waagent[1573]: 2025-05-17T00:36:21.344561Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 00:36:21.344783 waagent[1573]: 2025-05-17T00:36:21.344734Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 00:36:21.344994 waagent[1573]: 2025-05-17T00:36:21.344945Z INFO ExtHandler ExtHandler Initializing the goal state... May 17 00:36:21.448156 waagent[1573]: 2025-05-17T00:36:21.448036Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] May 17 00:36:21.487502 waagent[1573]: 2025-05-17T00:36:21.487418Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.166 May 17 00:36:21.488762 waagent[1573]: 2025-05-17T00:36:21.488683Z INFO ExtHandler May 17 00:36:21.488956 waagent[1573]: 2025-05-17T00:36:21.488886Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: e7cec1a2-d772-4f0f-853d-91316f39dd6f eTag: 16042125228718687757 source: Fabric] May 17 00:36:21.489839 waagent[1573]: 2025-05-17T00:36:21.489769Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. May 17 00:36:21.491210 waagent[1573]: 2025-05-17T00:36:21.491113Z INFO ExtHandler May 17 00:36:21.491382 waagent[1573]: 2025-05-17T00:36:21.491321Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] May 17 00:36:21.497701 waagent[1573]: 2025-05-17T00:36:21.497650Z INFO ExtHandler ExtHandler Downloading artifacts profile blob May 17 00:36:21.498124 waagent[1573]: 2025-05-17T00:36:21.498076Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required May 17 00:36:21.517245 waagent[1573]: 2025-05-17T00:36:21.517185Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. May 17 00:36:21.571963 waagent[1573]: 2025-05-17T00:36:21.571832Z INFO ExtHandler Downloaded certificate {'thumbprint': '37D689E4089787FB3EAA3D5DBC84C88ECF57F2E3', 'hasPrivateKey': True} May 17 00:36:21.573207 waagent[1573]: 2025-05-17T00:36:21.573097Z INFO ExtHandler Fetch goal state from WireServer completed May 17 00:36:21.574019 waagent[1573]: 2025-05-17T00:36:21.573960Z INFO ExtHandler ExtHandler Goal state initialization completed. May 17 00:36:21.590484 waagent[1573]: 2025-05-17T00:36:21.590324Z INFO ExtHandler ExtHandler OpenSSL version: OpenSSL 3.0.15 3 Sep 2024 (Library: OpenSSL 3.0.15 3 Sep 2024) May 17 00:36:21.598642 waagent[1573]: 2025-05-17T00:36:21.598543Z INFO ExtHandler ExtHandler Using iptables [version 1.8.8] to manage firewall rules May 17 00:36:21.602219 waagent[1573]: 2025-05-17T00:36:21.602094Z INFO ExtHandler ExtHandler Did not find a legacy firewall rule: ['iptables', '-w', '-t', 'security', '-C', 'OUTPUT', '-d', '168.63.129.16', '-p', 'tcp', '-m', 'conntrack', '--ctstate', 'INVALID,NEW', '-j', 'ACCEPT'] May 17 00:36:21.602423 waagent[1573]: 2025-05-17T00:36:21.602372Z INFO ExtHandler ExtHandler Checking state of the firewall May 17 00:36:21.630826 waagent[1573]: 2025-05-17T00:36:21.630705Z WARNING ExtHandler ExtHandler The firewall rules for Azure Fabric are not setup correctly (the environment thread will fix it): The following rules are missing: ['ACCEPT DNS'] due to: ['iptables: Bad rule (does a matching rule exist in that chain?).\n']. Current state: May 17 00:36:21.630826 waagent[1573]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) May 17 00:36:21.630826 waagent[1573]: pkts bytes target prot opt in out source destination May 17 00:36:21.630826 waagent[1573]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) May 17 00:36:21.630826 waagent[1573]: pkts bytes target prot opt in out source destination May 17 00:36:21.630826 waagent[1573]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) May 17 00:36:21.630826 waagent[1573]: pkts bytes target prot opt in out source destination May 17 00:36:21.630826 waagent[1573]: 97 10742 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 May 17 00:36:21.630826 waagent[1573]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW May 17 00:36:21.631912 waagent[1573]: 2025-05-17T00:36:21.631845Z INFO ExtHandler ExtHandler Setting up persistent firewall rules May 17 00:36:21.634585 waagent[1573]: 2025-05-17T00:36:21.634485Z INFO ExtHandler ExtHandler The firewalld service is not present on the system May 17 00:36:21.634820 waagent[1573]: 2025-05-17T00:36:21.634769Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service May 17 00:36:21.635153 waagent[1573]: 2025-05-17T00:36:21.635093Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup May 17 00:36:21.643101 waagent[1573]: 2025-05-17T00:36:21.643046Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now May 17 00:36:21.643562 waagent[1573]: 2025-05-17T00:36:21.643505Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' May 17 00:36:21.650711 waagent[1573]: 2025-05-17T00:36:21.650652Z INFO ExtHandler ExtHandler WALinuxAgent-2.13.1.1 running as process 1573 May 17 00:36:21.653581 waagent[1573]: 2025-05-17T00:36:21.653522Z INFO ExtHandler ExtHandler [CGI] Cgroups is not currently supported on ['flatcar', '3510.3.7', '', 'Flatcar Container Linux by Kinvolk'] May 17 00:36:21.654298 waagent[1573]: 2025-05-17T00:36:21.654240Z INFO ExtHandler ExtHandler [CGI] Agent will reset the quotas in case cgroup usage went from enabled to disabled May 17 00:36:21.655065 waagent[1573]: 2025-05-17T00:36:21.655008Z INFO ExtHandler ExtHandler [CGI] Agent cgroups enabled: False May 17 00:36:21.657506 waagent[1573]: 2025-05-17T00:36:21.657448Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: 1. configuration enabled [True], 2. cgroups v1 enabled [False] OR cgroups v2 is in use and v2 resource limiting configuration enabled [False], 3. python supported: [True] May 17 00:36:21.658698 waagent[1573]: 2025-05-17T00:36:21.658642Z INFO ExtHandler ExtHandler Starting env monitor service. May 17 00:36:21.659501 waagent[1573]: 2025-05-17T00:36:21.659445Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 00:36:21.659650 waagent[1573]: 2025-05-17T00:36:21.659603Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 00:36:21.660134 waagent[1573]: 2025-05-17T00:36:21.660078Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. May 17 00:36:21.660421 waagent[1573]: 2025-05-17T00:36:21.660368Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: May 17 00:36:21.660421 waagent[1573]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT May 17 00:36:21.660421 waagent[1573]: eth0 00000000 0104C80A 0003 0 0 1024 00000000 0 0 0 May 17 00:36:21.660421 waagent[1573]: eth0 0004C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 May 17 00:36:21.660421 waagent[1573]: eth0 0104C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 May 17 00:36:21.660421 waagent[1573]: eth0 10813FA8 0104C80A 0007 0 0 1024 FFFFFFFF 0 0 0 May 17 00:36:21.660421 waagent[1573]: eth0 FEA9FEA9 0104C80A 0007 0 0 1024 FFFFFFFF 0 0 0 May 17 00:36:21.663459 waagent[1573]: 2025-05-17T00:36:21.663369Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 00:36:21.663766 waagent[1573]: 2025-05-17T00:36:21.663703Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 00:36:21.664293 waagent[1573]: 2025-05-17T00:36:21.664235Z INFO EnvHandler ExtHandler Configure routes May 17 00:36:21.664585 waagent[1573]: 2025-05-17T00:36:21.664532Z INFO EnvHandler ExtHandler Gateway:None May 17 00:36:21.664747 waagent[1573]: 2025-05-17T00:36:21.664693Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. May 17 00:36:21.667306 waagent[1573]: 2025-05-17T00:36:21.667065Z INFO EnvHandler ExtHandler Routes:None May 17 00:36:21.669079 waagent[1573]: 2025-05-17T00:36:21.668748Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread May 17 00:36:21.670862 waagent[1573]: 2025-05-17T00:36:21.670720Z INFO ExtHandler ExtHandler Start Extension Telemetry service. May 17 00:36:21.675089 waagent[1573]: 2025-05-17T00:36:21.674992Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. May 17 00:36:21.679205 waagent[1573]: 2025-05-17T00:36:21.674684Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True May 17 00:36:21.679205 waagent[1573]: 2025-05-17T00:36:21.677361Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread May 17 00:36:21.684952 waagent[1573]: 2025-05-17T00:36:21.684483Z INFO MonitorHandler ExtHandler Network interfaces: May 17 00:36:21.684952 waagent[1573]: Executing ['ip', '-a', '-o', 'link']: May 17 00:36:21.684952 waagent[1573]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 May 17 00:36:21.684952 waagent[1573]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 60:45:bd:fc:30:ed brd ff:ff:ff:ff:ff:ff May 17 00:36:21.684952 waagent[1573]: 3: enP45971s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 60:45:bd:fc:30:ed brd ff:ff:ff:ff:ff:ff\ altname enP45971p0s2 May 17 00:36:21.684952 waagent[1573]: Executing ['ip', '-4', '-a', '-o', 'address']: May 17 00:36:21.684952 waagent[1573]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever May 17 00:36:21.684952 waagent[1573]: 2: eth0 inet 10.200.4.22/24 metric 1024 brd 10.200.4.255 scope global eth0\ valid_lft forever preferred_lft forever May 17 00:36:21.684952 waagent[1573]: Executing ['ip', '-6', '-a', '-o', 'address']: May 17 00:36:21.684952 waagent[1573]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever May 17 00:36:21.684952 waagent[1573]: 2: eth0 inet6 fe80::6245:bdff:fefc:30ed/64 scope link \ valid_lft forever preferred_lft forever May 17 00:36:21.690782 waagent[1573]: 2025-05-17T00:36:21.690702Z INFO ExtHandler ExtHandler Downloading agent manifest May 17 00:36:21.708177 waagent[1573]: 2025-05-17T00:36:21.708101Z INFO EnvHandler ExtHandler Using iptables [version 1.8.8] to manage firewall rules May 17 00:36:21.715635 waagent[1573]: 2025-05-17T00:36:21.715543Z INFO ExtHandler ExtHandler May 17 00:36:21.717718 waagent[1573]: 2025-05-17T00:36:21.717641Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: da7c9787-78db-4dab-b16f-fd089742bfdd correlation 32797533-dcd6-4125-93fc-bf401ca9aaac created: 2025-05-17T00:35:35.165169Z] May 17 00:36:21.723089 waagent[1573]: 2025-05-17T00:36:21.723031Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. May 17 00:36:21.732368 waagent[1573]: 2025-05-17T00:36:21.732308Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 16 ms] May 17 00:36:21.748930 waagent[1573]: 2025-05-17T00:36:21.748870Z WARNING EnvHandler ExtHandler The firewall is not configured correctly. The following rules are missing: ['ACCEPT DNS'] due to: ['iptables: Bad rule (does a matching rule exist in that chain?).\n']. Will reset it. Current state: May 17 00:36:21.748930 waagent[1573]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) May 17 00:36:21.748930 waagent[1573]: pkts bytes target prot opt in out source destination May 17 00:36:21.748930 waagent[1573]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) May 17 00:36:21.748930 waagent[1573]: pkts bytes target prot opt in out source destination May 17 00:36:21.748930 waagent[1573]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) May 17 00:36:21.748930 waagent[1573]: pkts bytes target prot opt in out source destination May 17 00:36:21.748930 waagent[1573]: 131 15506 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 May 17 00:36:21.748930 waagent[1573]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW May 17 00:36:21.764163 waagent[1573]: 2025-05-17T00:36:21.764095Z INFO ExtHandler ExtHandler Looking for existing remote access users. May 17 00:36:21.768842 waagent[1573]: 2025-05-17T00:36:21.768717Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.13.1.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 070826D5-68D8-4300-BF03-E0718FDD0B5F;UpdateGSErrors: 0;AutoUpdate: 1;UpdateMode: SelfUpdate;] May 17 00:36:21.800101 waagent[1573]: 2025-05-17T00:36:21.799992Z INFO EnvHandler ExtHandler The firewall was setup successfully: May 17 00:36:21.800101 waagent[1573]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) May 17 00:36:21.800101 waagent[1573]: pkts bytes target prot opt in out source destination May 17 00:36:21.800101 waagent[1573]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) May 17 00:36:21.800101 waagent[1573]: pkts bytes target prot opt in out source destination May 17 00:36:21.800101 waagent[1573]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) May 17 00:36:21.800101 waagent[1573]: pkts bytes target prot opt in out source destination May 17 00:36:21.800101 waagent[1573]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 May 17 00:36:21.800101 waagent[1573]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 May 17 00:36:21.800101 waagent[1573]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW May 17 00:36:23.480479 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 17 00:36:23.480813 systemd[1]: Stopped kubelet.service. May 17 00:36:23.480874 systemd[1]: kubelet.service: Consumed 1.202s CPU time. May 17 00:36:23.482903 systemd[1]: Starting kubelet.service... May 17 00:36:23.578093 systemd[1]: Started kubelet.service. May 17 00:36:24.284595 kubelet[1623]: E0517 00:36:24.284546 1623 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:36:24.287694 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:36:24.287863 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:36:34.480471 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 17 00:36:34.480801 systemd[1]: Stopped kubelet.service. May 17 00:36:34.482948 systemd[1]: Starting kubelet.service... May 17 00:36:34.575423 systemd[1]: Started kubelet.service. May 17 00:36:35.281068 kubelet[1632]: E0517 00:36:35.281017 1632 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:36:35.282879 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:36:35.283041 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:36:45.480470 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. May 17 00:36:45.480797 systemd[1]: Stopped kubelet.service. May 17 00:36:45.482849 systemd[1]: Starting kubelet.service... May 17 00:36:45.575721 systemd[1]: Started kubelet.service. May 17 00:36:45.613561 kubelet[1642]: E0517 00:36:45.613095 1642 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:36:45.615218 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:36:45.615378 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:36:52.077921 systemd[1]: Created slice system-sshd.slice. May 17 00:36:52.080215 systemd[1]: Started sshd@0-10.200.4.22:22-10.200.16.10:36166.service. May 17 00:36:52.726382 sshd[1649]: Accepted publickey for core from 10.200.16.10 port 36166 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:36:52.728115 sshd[1649]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:36:52.732214 systemd-logind[1362]: New session 3 of user core. May 17 00:36:52.733336 systemd[1]: Started session-3.scope. May 17 00:36:53.251500 systemd[1]: Started sshd@1-10.200.4.22:22-10.200.16.10:36172.service. May 17 00:36:53.850739 sshd[1654]: Accepted publickey for core from 10.200.16.10 port 36172 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:36:53.852438 sshd[1654]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:36:53.857693 systemd[1]: Started session-4.scope. May 17 00:36:53.858292 systemd-logind[1362]: New session 4 of user core. May 17 00:36:54.285426 sshd[1654]: pam_unix(sshd:session): session closed for user core May 17 00:36:54.288411 systemd[1]: sshd@1-10.200.4.22:22-10.200.16.10:36172.service: Deactivated successfully. May 17 00:36:54.289560 systemd[1]: session-4.scope: Deactivated successfully. May 17 00:36:54.289592 systemd-logind[1362]: Session 4 logged out. Waiting for processes to exit. May 17 00:36:54.290631 systemd-logind[1362]: Removed session 4. May 17 00:36:54.385128 systemd[1]: Started sshd@2-10.200.4.22:22-10.200.16.10:36178.service. May 17 00:36:54.983350 sshd[1660]: Accepted publickey for core from 10.200.16.10 port 36178 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:36:54.984941 sshd[1660]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:36:54.989688 systemd[1]: Started session-5.scope. May 17 00:36:54.990303 systemd-logind[1362]: New session 5 of user core. May 17 00:36:55.402427 sshd[1660]: pam_unix(sshd:session): session closed for user core May 17 00:36:55.405789 systemd[1]: sshd@2-10.200.4.22:22-10.200.16.10:36178.service: Deactivated successfully. May 17 00:36:55.406628 systemd[1]: session-5.scope: Deactivated successfully. May 17 00:36:55.407249 systemd-logind[1362]: Session 5 logged out. Waiting for processes to exit. May 17 00:36:55.407979 systemd-logind[1362]: Removed session 5. May 17 00:36:55.502230 systemd[1]: Started sshd@3-10.200.4.22:22-10.200.16.10:36186.service. May 17 00:36:55.730636 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. May 17 00:36:55.730943 systemd[1]: Stopped kubelet.service. May 17 00:36:55.732878 systemd[1]: Starting kubelet.service... May 17 00:36:55.825496 systemd[1]: Started kubelet.service. May 17 00:36:55.863587 kubelet[1672]: E0517 00:36:55.863549 1672 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:36:55.865246 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:36:55.865408 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:36:55.980024 kernel: hv_balloon: Max. dynamic memory size: 8192 MB May 17 00:36:56.097631 sshd[1666]: Accepted publickey for core from 10.200.16.10 port 36186 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:36:56.099281 sshd[1666]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:36:56.103913 systemd[1]: Started session-6.scope. May 17 00:36:56.104370 systemd-logind[1362]: New session 6 of user core. May 17 00:36:56.533773 sshd[1666]: pam_unix(sshd:session): session closed for user core May 17 00:36:56.537186 systemd[1]: sshd@3-10.200.4.22:22-10.200.16.10:36186.service: Deactivated successfully. May 17 00:36:56.538175 systemd[1]: session-6.scope: Deactivated successfully. May 17 00:36:56.538954 systemd-logind[1362]: Session 6 logged out. Waiting for processes to exit. May 17 00:36:56.539862 systemd-logind[1362]: Removed session 6. May 17 00:36:56.633081 systemd[1]: Started sshd@4-10.200.4.22:22-10.200.16.10:36198.service. May 17 00:36:57.231205 sshd[1681]: Accepted publickey for core from 10.200.16.10 port 36198 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:36:57.232851 sshd[1681]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:36:57.238575 systemd[1]: Started session-7.scope. May 17 00:36:57.239018 systemd-logind[1362]: New session 7 of user core. May 17 00:36:57.354635 update_engine[1363]: I0517 00:36:57.354542 1363 update_attempter.cc:509] Updating boot flags... May 17 00:36:57.648642 sudo[1723]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 17 00:36:57.648940 sudo[1723]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:36:57.659348 dbus-daemon[1352]: \xd0\xed\x84\u0008\x87U: received setenforce notice (enforcing=1510637888) May 17 00:36:57.661203 sudo[1723]: pam_unix(sudo:session): session closed for user root May 17 00:36:57.761532 sshd[1681]: pam_unix(sshd:session): session closed for user core May 17 00:36:57.764824 systemd[1]: sshd@4-10.200.4.22:22-10.200.16.10:36198.service: Deactivated successfully. May 17 00:36:57.765740 systemd[1]: session-7.scope: Deactivated successfully. May 17 00:36:57.766415 systemd-logind[1362]: Session 7 logged out. Waiting for processes to exit. May 17 00:36:57.767234 systemd-logind[1362]: Removed session 7. May 17 00:36:57.861365 systemd[1]: Started sshd@5-10.200.4.22:22-10.200.16.10:36202.service. May 17 00:36:58.455935 sshd[1727]: Accepted publickey for core from 10.200.16.10 port 36202 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:36:58.457718 sshd[1727]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:36:58.462665 systemd[1]: Started session-8.scope. May 17 00:36:58.463279 systemd-logind[1362]: New session 8 of user core. May 17 00:36:58.783924 sudo[1731]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 17 00:36:58.784237 sudo[1731]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:36:58.786954 sudo[1731]: pam_unix(sudo:session): session closed for user root May 17 00:36:58.791777 sudo[1730]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 17 00:36:58.792063 sudo[1730]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:36:58.801094 systemd[1]: Stopping audit-rules.service... May 17 00:36:58.801000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 17 00:36:58.806327 auditctl[1734]: No rules May 17 00:36:58.806603 kernel: kauditd_printk_skb: 123 callbacks suppressed May 17 00:36:58.806650 kernel: audit: type=1305 audit(1747442218.801:204): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 17 00:36:58.806952 systemd[1]: audit-rules.service: Deactivated successfully. May 17 00:36:58.807169 systemd[1]: Stopped audit-rules.service. May 17 00:36:58.811356 systemd[1]: Starting audit-rules.service... May 17 00:36:58.801000 audit[1734]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff675519c0 a2=420 a3=0 items=0 ppid=1 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:58.801000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 17 00:36:58.832723 augenrules[1751]: No rules May 17 00:36:58.835332 kernel: audit: type=1300 audit(1747442218.801:204): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff675519c0 a2=420 a3=0 items=0 ppid=1 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:58.835395 kernel: audit: type=1327 audit(1747442218.801:204): proctitle=2F7362696E2F617564697463746C002D44 May 17 00:36:58.835419 kernel: audit: type=1131 audit(1747442218.806:205): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:58.806000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:58.834606 sudo[1730]: pam_unix(sudo:session): session closed for user root May 17 00:36:58.833536 systemd[1]: Finished audit-rules.service. May 17 00:36:58.832000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:58.854897 kernel: audit: type=1130 audit(1747442218.832:206): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:58.854961 kernel: audit: type=1106 audit(1747442218.833:207): pid=1730 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:36:58.833000 audit[1730]: USER_END pid=1730 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:36:58.833000 audit[1730]: CRED_DISP pid=1730 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:36:58.876986 kernel: audit: type=1104 audit(1747442218.833:208): pid=1730 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:36:58.939013 sshd[1727]: pam_unix(sshd:session): session closed for user core May 17 00:36:58.939000 audit[1727]: USER_END pid=1727 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:36:58.942736 systemd[1]: sshd@5-10.200.4.22:22-10.200.16.10:36202.service: Deactivated successfully. May 17 00:36:58.943571 systemd[1]: session-8.scope: Deactivated successfully. May 17 00:36:58.944727 systemd-logind[1362]: Session 8 logged out. Waiting for processes to exit. May 17 00:36:58.945600 systemd-logind[1362]: Removed session 8. May 17 00:36:58.939000 audit[1727]: CRED_DISP pid=1727 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:36:58.967291 kernel: audit: type=1106 audit(1747442218.939:209): pid=1727 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:36:58.967373 kernel: audit: type=1104 audit(1747442218.939:210): pid=1727 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:36:58.967404 kernel: audit: type=1131 audit(1747442218.939:211): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.4.22:22-10.200.16.10:36202 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:58.939000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.4.22:22-10.200.16.10:36202 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:59.038259 systemd[1]: Started sshd@6-10.200.4.22:22-10.200.16.10:45216.service. May 17 00:36:59.037000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.4.22:22-10.200.16.10:45216 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:59.637000 audit[1757]: USER_ACCT pid=1757 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:36:59.639318 sshd[1757]: Accepted publickey for core from 10.200.16.10 port 45216 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:36:59.639000 audit[1757]: CRED_ACQ pid=1757 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:36:59.639000 audit[1757]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca7cc8010 a2=3 a3=0 items=0 ppid=1 pid=1757 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:59.639000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:36:59.640987 sshd[1757]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:36:59.646051 systemd[1]: Started session-9.scope. May 17 00:36:59.646631 systemd-logind[1362]: New session 9 of user core. May 17 00:36:59.649000 audit[1757]: USER_START pid=1757 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:36:59.651000 audit[1759]: CRED_ACQ pid=1759 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:36:59.968000 audit[1760]: USER_ACCT pid=1760 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:36:59.968000 audit[1760]: CRED_REFR pid=1760 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:36:59.969491 sudo[1760]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 17 00:36:59.969862 sudo[1760]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:36:59.971000 audit[1760]: USER_START pid=1760 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:37:00.025679 systemd[1]: Starting coreos-metadata.service... May 17 00:37:00.070785 coreos-metadata[1764]: May 17 00:37:00.070 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 May 17 00:37:00.073044 coreos-metadata[1764]: May 17 00:37:00.073 INFO Fetch successful May 17 00:37:00.073346 coreos-metadata[1764]: May 17 00:37:00.073 INFO Fetching http://168.63.129.16/machine/?comp=goalstate: Attempt #1 May 17 00:37:00.074770 coreos-metadata[1764]: May 17 00:37:00.074 INFO Fetch successful May 17 00:37:00.075117 coreos-metadata[1764]: May 17 00:37:00.075 INFO Fetching http://168.63.129.16/machine/1b2326d2-18b3-4b76-8cf1-10f78098db13/4f5badb5%2D1de9%2D40c2%2D8391%2D12a56f106d13.%5Fci%2D3510.3.7%2Dn%2Da14653f0ea?comp=config&type=sharedConfig&incarnation=1: Attempt #1 May 17 00:37:00.076589 coreos-metadata[1764]: May 17 00:37:00.076 INFO Fetch successful May 17 00:37:00.109309 coreos-metadata[1764]: May 17 00:37:00.109 INFO Fetching http://169.254.169.254/metadata/instance/compute/vmSize?api-version=2017-08-01&format=text: Attempt #1 May 17 00:37:00.118971 coreos-metadata[1764]: May 17 00:37:00.118 INFO Fetch successful May 17 00:37:00.127939 systemd[1]: Finished coreos-metadata.service. May 17 00:37:00.127000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:00.716543 systemd[1]: Stopped kubelet.service. May 17 00:37:00.715000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:00.715000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:00.719478 systemd[1]: Starting kubelet.service... May 17 00:37:00.762893 systemd[1]: Reloading. May 17 00:37:00.874292 /usr/lib/systemd/system-generators/torcx-generator[1819]: time="2025-05-17T00:37:00Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:37:00.882307 /usr/lib/systemd/system-generators/torcx-generator[1819]: time="2025-05-17T00:37:00Z" level=info msg="torcx already run" May 17 00:37:00.969406 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:37:00.969425 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:37:00.986048 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:37:01.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.055000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.055000 audit: BPF prog-id=41 op=LOAD May 17 00:37:01.055000 audit: BPF prog-id=40 op=UNLOAD May 17 00:37:01.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.057000 audit: BPF prog-id=42 op=LOAD May 17 00:37:01.057000 audit: BPF prog-id=25 op=UNLOAD May 17 00:37:01.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.057000 audit: BPF prog-id=43 op=LOAD May 17 00:37:01.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.057000 audit: BPF prog-id=44 op=LOAD May 17 00:37:01.057000 audit: BPF prog-id=26 op=UNLOAD May 17 00:37:01.057000 audit: BPF prog-id=27 op=UNLOAD May 17 00:37:01.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.058000 audit: BPF prog-id=45 op=LOAD May 17 00:37:01.058000 audit: BPF prog-id=33 op=UNLOAD May 17 00:37:01.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.060000 audit: BPF prog-id=46 op=LOAD May 17 00:37:01.060000 audit: BPF prog-id=35 op=UNLOAD May 17 00:37:01.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.060000 audit: BPF prog-id=47 op=LOAD May 17 00:37:01.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.060000 audit: BPF prog-id=48 op=LOAD May 17 00:37:01.060000 audit: BPF prog-id=36 op=UNLOAD May 17 00:37:01.060000 audit: BPF prog-id=37 op=UNLOAD May 17 00:37:01.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.061000 audit: BPF prog-id=49 op=LOAD May 17 00:37:01.061000 audit: BPF prog-id=38 op=UNLOAD May 17 00:37:01.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.063000 audit: BPF prog-id=50 op=LOAD May 17 00:37:01.063000 audit: BPF prog-id=34 op=UNLOAD May 17 00:37:01.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.064000 audit: BPF prog-id=51 op=LOAD May 17 00:37:01.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.065000 audit: BPF prog-id=52 op=LOAD May 17 00:37:01.065000 audit: BPF prog-id=28 op=UNLOAD May 17 00:37:01.065000 audit: BPF prog-id=29 op=UNLOAD May 17 00:37:01.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.067000 audit: BPF prog-id=53 op=LOAD May 17 00:37:01.067000 audit: BPF prog-id=30 op=UNLOAD May 17 00:37:01.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.067000 audit: BPF prog-id=54 op=LOAD May 17 00:37:01.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:01.067000 audit: BPF prog-id=55 op=LOAD May 17 00:37:01.067000 audit: BPF prog-id=31 op=UNLOAD May 17 00:37:01.067000 audit: BPF prog-id=32 op=UNLOAD May 17 00:37:01.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:01.090994 systemd[1]: Stopping kubelet.service... May 17 00:37:01.091388 systemd[1]: kubelet.service: Deactivated successfully. May 17 00:37:01.090000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:01.091601 systemd[1]: Stopped kubelet.service. May 17 00:37:01.094448 systemd[1]: Starting kubelet.service... May 17 00:37:01.527806 systemd[1]: Started kubelet.service. May 17 00:37:01.527000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:01.572502 kubelet[1889]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:37:01.572854 kubelet[1889]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 17 00:37:01.572895 kubelet[1889]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:37:01.573032 kubelet[1889]: I0517 00:37:01.573001 1889 server.go:212] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 17 00:37:01.799502 kubelet[1889]: I0517 00:37:01.798967 1889 server.go:530] "Kubelet version" kubeletVersion="v1.33.0" May 17 00:37:01.799676 kubelet[1889]: I0517 00:37:01.799661 1889 server.go:532] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 17 00:37:01.800828 kubelet[1889]: I0517 00:37:01.800807 1889 server.go:956] "Client rotation is on, will bootstrap in background" May 17 00:37:02.417698 kubelet[1889]: I0517 00:37:02.417613 1889 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 17 00:37:02.424408 kubelet[1889]: E0517 00:37:02.424353 1889 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 17 00:37:02.424609 kubelet[1889]: I0517 00:37:02.424596 1889 server.go:1423] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 17 00:37:02.428710 kubelet[1889]: I0517 00:37:02.428683 1889 server.go:782] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 17 00:37:02.428973 kubelet[1889]: I0517 00:37:02.428939 1889 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 17 00:37:02.429185 kubelet[1889]: I0517 00:37:02.428970 1889 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.200.4.22","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"MemoryManagerPolicy":"None","MemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 17 00:37:02.429344 kubelet[1889]: I0517 00:37:02.429189 1889 topology_manager.go:138] "Creating topology manager with none policy" May 17 00:37:02.429344 kubelet[1889]: I0517 00:37:02.429203 1889 container_manager_linux.go:303] "Creating device plugin manager" May 17 00:37:02.429443 kubelet[1889]: I0517 00:37:02.429353 1889 state_mem.go:36] "Initialized new in-memory state store" May 17 00:37:02.434658 kubelet[1889]: I0517 00:37:02.434637 1889 kubelet.go:480] "Attempting to sync node with API server" May 17 00:37:02.434658 kubelet[1889]: I0517 00:37:02.434661 1889 kubelet.go:375] "Adding static pod path" path="/etc/kubernetes/manifests" May 17 00:37:02.434794 kubelet[1889]: I0517 00:37:02.434725 1889 kubelet.go:386] "Adding apiserver pod source" May 17 00:37:02.434794 kubelet[1889]: I0517 00:37:02.434741 1889 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 17 00:37:02.442060 kubelet[1889]: E0517 00:37:02.442030 1889 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:02.442168 kubelet[1889]: E0517 00:37:02.442087 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:02.445640 kubelet[1889]: I0517 00:37:02.445611 1889 kuberuntime_manager.go:279] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 17 00:37:02.446259 kubelet[1889]: I0517 00:37:02.446231 1889 kubelet.go:935] "Not starting ClusterTrustBundle informer because we are in static kubelet mode or the ClusterTrustBundleProjection featuregate is disabled" May 17 00:37:02.446819 kubelet[1889]: W0517 00:37:02.446794 1889 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 17 00:37:02.449623 kubelet[1889]: I0517 00:37:02.449603 1889 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 17 00:37:02.449709 kubelet[1889]: I0517 00:37:02.449673 1889 server.go:1289] "Started kubelet" May 17 00:37:02.453331 kubelet[1889]: I0517 00:37:02.453280 1889 server.go:180] "Starting to listen" address="0.0.0.0" port=10250 May 17 00:37:02.455051 kubelet[1889]: I0517 00:37:02.454517 1889 server.go:317] "Adding debug handlers to kubelet server" May 17 00:37:02.456613 kubelet[1889]: I0517 00:37:02.456549 1889 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 17 00:37:02.457173 kubelet[1889]: I0517 00:37:02.457154 1889 server.go:255] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 17 00:37:02.459000 audit[1889]: AVC avc: denied { mac_admin } for pid=1889 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:02.459000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:37:02.459000 audit[1889]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ba9740 a1=c000c82498 a2=c000ba9710 a3=25 items=0 ppid=1 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:02.459000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:37:02.461652 kubelet[1889]: I0517 00:37:02.461626 1889 kubelet.go:1552] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 17 00:37:02.460000 audit[1889]: AVC avc: denied { mac_admin } for pid=1889 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:02.460000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:37:02.460000 audit[1889]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ad3600 a1=c000c824b0 a2=c000ba97d0 a3=25 items=0 ppid=1 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:02.460000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:37:02.462023 kubelet[1889]: I0517 00:37:02.462003 1889 kubelet.go:1556] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 17 00:37:02.462242 kubelet[1889]: I0517 00:37:02.462229 1889 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 17 00:37:02.463114 kubelet[1889]: E0517 00:37:02.463087 1889 reflector.go:200] "Failed to watch" err="failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" May 17 00:37:02.463387 kubelet[1889]: E0517 00:37:02.463335 1889 reflector.go:200] "Failed to watch" err="failed to list *v1.Node: nodes \"10.200.4.22\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Node" May 17 00:37:02.465593 kubelet[1889]: E0517 00:37:02.464210 1889 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.200.4.22.1840297166a111b7 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.200.4.22,UID:10.200.4.22,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:10.200.4.22,},FirstTimestamp:2025-05-17 00:37:02.449627575 +0000 UTC m=+0.914684784,LastTimestamp:2025-05-17 00:37:02.449627575 +0000 UTC m=+0.914684784,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.200.4.22,}" May 17 00:37:02.466803 kubelet[1889]: I0517 00:37:02.466761 1889 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 17 00:37:02.470847 kubelet[1889]: E0517 00:37:02.470546 1889 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.4.22\" not found" May 17 00:37:02.470847 kubelet[1889]: I0517 00:37:02.470586 1889 volume_manager.go:297] "Starting Kubelet Volume Manager" May 17 00:37:02.470847 kubelet[1889]: I0517 00:37:02.470833 1889 desired_state_of_world_populator.go:150] "Desired state populator starts to run" May 17 00:37:02.471019 kubelet[1889]: I0517 00:37:02.470888 1889 reconciler.go:26] "Reconciler: start to sync state" May 17 00:37:02.473127 kubelet[1889]: I0517 00:37:02.473104 1889 factory.go:223] Registration of the systemd container factory successfully May 17 00:37:02.473266 kubelet[1889]: I0517 00:37:02.473240 1889 factory.go:221] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 17 00:37:02.476000 audit[1905]: NETFILTER_CFG table=mangle:9 family=2 entries=2 op=nft_register_chain pid=1905 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:02.477773 kubelet[1889]: E0517 00:37:02.477731 1889 kubelet.go:1600] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 17 00:37:02.476000 audit[1905]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc0a805bb0 a2=0 a3=7ffc0a805b9c items=0 ppid=1889 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:02.476000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 00:37:02.478566 kubelet[1889]: I0517 00:37:02.478543 1889 factory.go:223] Registration of the containerd container factory successfully May 17 00:37:02.478000 audit[1906]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1906 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:02.478000 audit[1906]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffd95b7b450 a2=0 a3=7ffd95b7b43c items=0 ppid=1889 pid=1906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:02.478000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 00:37:02.481000 audit[1908]: NETFILTER_CFG table=filter:11 family=2 entries=2 op=nft_register_chain pid=1908 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:02.481000 audit[1908]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff89e53020 a2=0 a3=7fff89e5300c items=0 ppid=1889 pid=1908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:02.481000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:37:02.483000 audit[1910]: NETFILTER_CFG table=filter:12 family=2 entries=2 op=nft_register_chain pid=1910 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:02.483000 audit[1910]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff0ddd1430 a2=0 a3=7fff0ddd141c items=0 ppid=1889 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:02.483000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:37:02.497000 audit[1913]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_rule pid=1913 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:02.497000 audit[1913]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffd1b721610 a2=0 a3=7ffd1b7215fc items=0 ppid=1889 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:02.497000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 17 00:37:02.499741 kubelet[1889]: I0517 00:37:02.499698 1889 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv4" May 17 00:37:02.499000 audit[1914]: NETFILTER_CFG table=mangle:14 family=10 entries=2 op=nft_register_chain pid=1914 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:02.499000 audit[1914]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffb3d27410 a2=0 a3=7fffb3d273fc items=0 ppid=1889 pid=1914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:02.499000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 00:37:02.501433 kubelet[1889]: I0517 00:37:02.501414 1889 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv6" May 17 00:37:02.501529 kubelet[1889]: I0517 00:37:02.501448 1889 status_manager.go:230] "Starting to sync pod status with apiserver" May 17 00:37:02.501529 kubelet[1889]: I0517 00:37:02.501483 1889 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 17 00:37:02.501529 kubelet[1889]: I0517 00:37:02.501510 1889 kubelet.go:2436] "Starting kubelet main sync loop" May 17 00:37:02.501662 kubelet[1889]: E0517 00:37:02.501635 1889 kubelet.go:2460] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 17 00:37:02.501000 audit[1916]: NETFILTER_CFG table=mangle:15 family=2 entries=1 op=nft_register_chain pid=1916 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:02.501000 audit[1916]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc04d87020 a2=0 a3=7ffc04d8700c items=0 ppid=1889 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:02.501000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 00:37:02.507000 audit[1919]: NETFILTER_CFG table=mangle:16 family=10 entries=1 op=nft_register_chain pid=1919 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:02.507000 audit[1919]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd38017f00 a2=0 a3=7ffd38017eec items=0 ppid=1889 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:02.507000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 00:37:02.510007 kubelet[1889]: I0517 00:37:02.509984 1889 cpu_manager.go:221] "Starting CPU manager" policy="none" May 17 00:37:02.510007 kubelet[1889]: I0517 00:37:02.510004 1889 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 17 00:37:02.510123 kubelet[1889]: I0517 00:37:02.510025 1889 state_mem.go:36] "Initialized new in-memory state store" May 17 00:37:02.509000 audit[1920]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1920 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:02.509000 audit[1920]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffccf8adc50 a2=0 a3=7ffccf8adc3c items=0 ppid=1889 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:02.509000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 00:37:02.510000 audit[1923]: NETFILTER_CFG table=nat:18 family=10 entries=2 op=nft_register_chain pid=1923 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:02.510000 audit[1923]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffddfb043c0 a2=0 a3=7ffddfb043ac items=0 ppid=1889 pid=1923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:02.510000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 00:37:02.512000 audit[1924]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=1924 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:02.512000 audit[1924]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffdc70b620 a2=0 a3=7fffdc70b60c items=0 ppid=1889 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:02.512000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 00:37:02.512000 audit[1925]: NETFILTER_CFG table=filter:20 family=10 entries=2 op=nft_register_chain pid=1925 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:02.512000 audit[1925]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcb6feb010 a2=0 a3=7ffcb6feaffc items=0 ppid=1889 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:02.512000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 00:37:02.516568 kubelet[1889]: I0517 00:37:02.516547 1889 policy_none.go:49] "None policy: Start" May 17 00:37:02.516658 kubelet[1889]: I0517 00:37:02.516572 1889 memory_manager.go:186] "Starting memorymanager" policy="None" May 17 00:37:02.516658 kubelet[1889]: I0517 00:37:02.516587 1889 state_mem.go:35] "Initializing new in-memory state store" May 17 00:37:02.523762 systemd[1]: Created slice kubepods.slice. May 17 00:37:02.524423 kubelet[1889]: E0517 00:37:02.524404 1889 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.200.4.22\" not found" node="10.200.4.22" May 17 00:37:02.531539 systemd[1]: Created slice kubepods-burstable.slice. May 17 00:37:02.534595 systemd[1]: Created slice kubepods-besteffort.slice. May 17 00:37:02.542225 kubelet[1889]: E0517 00:37:02.542203 1889 manager.go:517] "Failed to read data from checkpoint" err="checkpoint is not found" checkpoint="kubelet_internal_checkpoint" May 17 00:37:02.541000 audit[1889]: AVC avc: denied { mac_admin } for pid=1889 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:02.541000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:37:02.541000 audit[1889]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bcc8d0 a1=c000aa70f8 a2=c000bcc8a0 a3=25 items=0 ppid=1 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:02.541000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:37:02.543251 kubelet[1889]: E0517 00:37:02.543229 1889 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" path="/var/lib/kubelet/device-plugins/" May 17 00:37:02.543518 kubelet[1889]: I0517 00:37:02.543498 1889 eviction_manager.go:189] "Eviction manager: starting control loop" May 17 00:37:02.543696 kubelet[1889]: I0517 00:37:02.543612 1889 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 17 00:37:02.544826 kubelet[1889]: I0517 00:37:02.544812 1889 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 17 00:37:02.548754 kubelet[1889]: E0517 00:37:02.548479 1889 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 17 00:37:02.548754 kubelet[1889]: E0517 00:37:02.548556 1889 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.200.4.22\" not found" May 17 00:37:02.644809 kubelet[1889]: I0517 00:37:02.644769 1889 kubelet_node_status.go:75] "Attempting to register node" node="10.200.4.22" May 17 00:37:02.658459 kubelet[1889]: I0517 00:37:02.658428 1889 kubelet_node_status.go:78] "Successfully registered node" node="10.200.4.22" May 17 00:37:02.658459 kubelet[1889]: E0517 00:37:02.658460 1889 kubelet_node_status.go:548] "Error updating node status, will retry" err="error getting node \"10.200.4.22\": node \"10.200.4.22\" not found" May 17 00:37:02.694961 kubelet[1889]: E0517 00:37:02.694830 1889 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.4.22\" not found" May 17 00:37:02.795025 kubelet[1889]: E0517 00:37:02.794968 1889 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.4.22\" not found" May 17 00:37:02.803240 kubelet[1889]: I0517 00:37:02.803189 1889 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" May 17 00:37:02.803518 kubelet[1889]: I0517 00:37:02.803412 1889 reflector.go:556] "Warning: watch ended with error" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.RuntimeClass" err="very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received" May 17 00:37:02.803518 kubelet[1889]: I0517 00:37:02.803458 1889 reflector.go:556] "Warning: watch ended with error" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" err="very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received" May 17 00:37:02.895962 kubelet[1889]: E0517 00:37:02.895905 1889 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.4.22\" not found" May 17 00:37:02.996536 kubelet[1889]: E0517 00:37:02.996477 1889 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.4.22\" not found" May 17 00:37:03.086973 sudo[1760]: pam_unix(sudo:session): session closed for user root May 17 00:37:03.085000 audit[1760]: USER_END pid=1760 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:37:03.086000 audit[1760]: CRED_DISP pid=1760 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:37:03.097322 kubelet[1889]: E0517 00:37:03.097251 1889 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.4.22\" not found" May 17 00:37:03.191301 sshd[1757]: pam_unix(sshd:session): session closed for user core May 17 00:37:03.192000 audit[1757]: USER_END pid=1757 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:03.192000 audit[1757]: CRED_DISP pid=1757 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:03.194945 systemd[1]: sshd@6-10.200.4.22:22-10.200.16.10:45216.service: Deactivated successfully. May 17 00:37:03.194000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.4.22:22-10.200.16.10:45216 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:03.196019 systemd[1]: session-9.scope: Deactivated successfully. May 17 00:37:03.196837 systemd-logind[1362]: Session 9 logged out. Waiting for processes to exit. May 17 00:37:03.197876 systemd-logind[1362]: Removed session 9. May 17 00:37:03.198420 kubelet[1889]: E0517 00:37:03.198380 1889 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.4.22\" not found" May 17 00:37:03.298670 kubelet[1889]: E0517 00:37:03.298531 1889 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.4.22\" not found" May 17 00:37:03.399395 kubelet[1889]: E0517 00:37:03.399331 1889 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.4.22\" not found" May 17 00:37:03.442965 kubelet[1889]: E0517 00:37:03.442898 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:03.500455 kubelet[1889]: E0517 00:37:03.500394 1889 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.4.22\" not found" May 17 00:37:03.601490 kubelet[1889]: I0517 00:37:03.601207 1889 kuberuntime_manager.go:1746] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" May 17 00:37:03.601935 env[1373]: time="2025-05-17T00:37:03.601894278Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 17 00:37:03.602471 kubelet[1889]: I0517 00:37:03.602448 1889 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" May 17 00:37:04.443047 kubelet[1889]: E0517 00:37:04.443001 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:04.443599 kubelet[1889]: I0517 00:37:04.443013 1889 apiserver.go:52] "Watching apiserver" May 17 00:37:04.481436 kubelet[1889]: I0517 00:37:04.481376 1889 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/4c0874f4-3d52-4bc3-91d1-2863ef2820cc-registration-dir\") pod \"csi-node-driver-mjvqz\" (UID: \"4c0874f4-3d52-4bc3-91d1-2863ef2820cc\") " pod="calico-system/csi-node-driver-mjvqz" May 17 00:37:04.481436 kubelet[1889]: I0517 00:37:04.481433 1889 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/13047aa0-60d3-43ed-86c0-99f4b2f6d84c-node-certs\") pod \"calico-node-r4pqn\" (UID: \"13047aa0-60d3-43ed-86c0-99f4b2f6d84c\") " pod="calico-system/calico-node-r4pqn" May 17 00:37:04.481707 kubelet[1889]: I0517 00:37:04.481460 1889 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/13047aa0-60d3-43ed-86c0-99f4b2f6d84c-var-lib-calico\") pod \"calico-node-r4pqn\" (UID: \"13047aa0-60d3-43ed-86c0-99f4b2f6d84c\") " pod="calico-system/calico-node-r4pqn" May 17 00:37:04.481707 kubelet[1889]: I0517 00:37:04.481484 1889 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/13047aa0-60d3-43ed-86c0-99f4b2f6d84c-xtables-lock\") pod \"calico-node-r4pqn\" (UID: \"13047aa0-60d3-43ed-86c0-99f4b2f6d84c\") " pod="calico-system/calico-node-r4pqn" May 17 00:37:04.481707 kubelet[1889]: I0517 00:37:04.481508 1889 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-s6r52\" (UniqueName: \"kubernetes.io/projected/13047aa0-60d3-43ed-86c0-99f4b2f6d84c-kube-api-access-s6r52\") pod \"calico-node-r4pqn\" (UID: \"13047aa0-60d3-43ed-86c0-99f4b2f6d84c\") " pod="calico-system/calico-node-r4pqn" May 17 00:37:04.481707 kubelet[1889]: I0517 00:37:04.481532 1889 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/13047aa0-60d3-43ed-86c0-99f4b2f6d84c-lib-modules\") pod \"calico-node-r4pqn\" (UID: \"13047aa0-60d3-43ed-86c0-99f4b2f6d84c\") " pod="calico-system/calico-node-r4pqn" May 17 00:37:04.481707 kubelet[1889]: I0517 00:37:04.481561 1889 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/4c0874f4-3d52-4bc3-91d1-2863ef2820cc-socket-dir\") pod \"csi-node-driver-mjvqz\" (UID: \"4c0874f4-3d52-4bc3-91d1-2863ef2820cc\") " pod="calico-system/csi-node-driver-mjvqz" May 17 00:37:04.482008 kubelet[1889]: I0517 00:37:04.481585 1889 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/4c0874f4-3d52-4bc3-91d1-2863ef2820cc-varrun\") pod \"csi-node-driver-mjvqz\" (UID: \"4c0874f4-3d52-4bc3-91d1-2863ef2820cc\") " pod="calico-system/csi-node-driver-mjvqz" May 17 00:37:04.482008 kubelet[1889]: I0517 00:37:04.481611 1889 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/13047aa0-60d3-43ed-86c0-99f4b2f6d84c-cni-log-dir\") pod \"calico-node-r4pqn\" (UID: \"13047aa0-60d3-43ed-86c0-99f4b2f6d84c\") " pod="calico-system/calico-node-r4pqn" May 17 00:37:04.482008 kubelet[1889]: I0517 00:37:04.481633 1889 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/13047aa0-60d3-43ed-86c0-99f4b2f6d84c-cni-net-dir\") pod \"calico-node-r4pqn\" (UID: \"13047aa0-60d3-43ed-86c0-99f4b2f6d84c\") " pod="calico-system/calico-node-r4pqn" May 17 00:37:04.482008 kubelet[1889]: I0517 00:37:04.481660 1889 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/13047aa0-60d3-43ed-86c0-99f4b2f6d84c-flexvol-driver-host\") pod \"calico-node-r4pqn\" (UID: \"13047aa0-60d3-43ed-86c0-99f4b2f6d84c\") " pod="calico-system/calico-node-r4pqn" May 17 00:37:04.482008 kubelet[1889]: I0517 00:37:04.481688 1889 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/13047aa0-60d3-43ed-86c0-99f4b2f6d84c-tigera-ca-bundle\") pod \"calico-node-r4pqn\" (UID: \"13047aa0-60d3-43ed-86c0-99f4b2f6d84c\") " pod="calico-system/calico-node-r4pqn" May 17 00:37:04.482301 kubelet[1889]: I0517 00:37:04.481712 1889 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nv7fl\" (UniqueName: \"kubernetes.io/projected/4c0874f4-3d52-4bc3-91d1-2863ef2820cc-kube-api-access-nv7fl\") pod \"csi-node-driver-mjvqz\" (UID: \"4c0874f4-3d52-4bc3-91d1-2863ef2820cc\") " pod="calico-system/csi-node-driver-mjvqz" May 17 00:37:04.482301 kubelet[1889]: I0517 00:37:04.481756 1889 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/13047aa0-60d3-43ed-86c0-99f4b2f6d84c-cni-bin-dir\") pod \"calico-node-r4pqn\" (UID: \"13047aa0-60d3-43ed-86c0-99f4b2f6d84c\") " pod="calico-system/calico-node-r4pqn" May 17 00:37:04.482301 kubelet[1889]: I0517 00:37:04.481786 1889 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/13047aa0-60d3-43ed-86c0-99f4b2f6d84c-policysync\") pod \"calico-node-r4pqn\" (UID: \"13047aa0-60d3-43ed-86c0-99f4b2f6d84c\") " pod="calico-system/calico-node-r4pqn" May 17 00:37:04.482301 kubelet[1889]: I0517 00:37:04.481813 1889 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/13047aa0-60d3-43ed-86c0-99f4b2f6d84c-var-run-calico\") pod \"calico-node-r4pqn\" (UID: \"13047aa0-60d3-43ed-86c0-99f4b2f6d84c\") " pod="calico-system/calico-node-r4pqn" May 17 00:37:04.482301 kubelet[1889]: I0517 00:37:04.481837 1889 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/4c0874f4-3d52-4bc3-91d1-2863ef2820cc-kubelet-dir\") pod \"csi-node-driver-mjvqz\" (UID: \"4c0874f4-3d52-4bc3-91d1-2863ef2820cc\") " pod="calico-system/csi-node-driver-mjvqz" May 17 00:37:04.482600 kubelet[1889]: E0517 00:37:04.482454 1889 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mjvqz" podUID="4c0874f4-3d52-4bc3-91d1-2863ef2820cc" May 17 00:37:04.492414 systemd[1]: Created slice kubepods-besteffort-pod13047aa0_60d3_43ed_86c0_99f4b2f6d84c.slice. May 17 00:37:04.500581 systemd[1]: Created slice kubepods-besteffort-pod6ba6f9ca_5657_4a50_8f8b_036a9efb39f5.slice. May 17 00:37:04.572035 kubelet[1889]: I0517 00:37:04.571988 1889 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" May 17 00:37:04.582558 kubelet[1889]: I0517 00:37:04.582519 1889 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/6ba6f9ca-5657-4a50-8f8b-036a9efb39f5-kube-proxy\") pod \"kube-proxy-gzgl4\" (UID: \"6ba6f9ca-5657-4a50-8f8b-036a9efb39f5\") " pod="kube-system/kube-proxy-gzgl4" May 17 00:37:04.583157 kubelet[1889]: I0517 00:37:04.583116 1889 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/6ba6f9ca-5657-4a50-8f8b-036a9efb39f5-xtables-lock\") pod \"kube-proxy-gzgl4\" (UID: \"6ba6f9ca-5657-4a50-8f8b-036a9efb39f5\") " pod="kube-system/kube-proxy-gzgl4" May 17 00:37:04.583361 kubelet[1889]: I0517 00:37:04.583338 1889 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qddrv\" (UniqueName: \"kubernetes.io/projected/6ba6f9ca-5657-4a50-8f8b-036a9efb39f5-kube-api-access-qddrv\") pod \"kube-proxy-gzgl4\" (UID: \"6ba6f9ca-5657-4a50-8f8b-036a9efb39f5\") " pod="kube-system/kube-proxy-gzgl4" May 17 00:37:04.583518 kubelet[1889]: I0517 00:37:04.582982 1889 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 17 00:37:04.583637 kubelet[1889]: I0517 00:37:04.583615 1889 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/6ba6f9ca-5657-4a50-8f8b-036a9efb39f5-lib-modules\") pod \"kube-proxy-gzgl4\" (UID: \"6ba6f9ca-5657-4a50-8f8b-036a9efb39f5\") " pod="kube-system/kube-proxy-gzgl4" May 17 00:37:04.585695 kubelet[1889]: E0517 00:37:04.585674 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:04.585695 kubelet[1889]: W0517 00:37:04.585694 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:04.585834 kubelet[1889]: E0517 00:37:04.585712 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:04.586019 kubelet[1889]: E0517 00:37:04.585999 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:04.586019 kubelet[1889]: W0517 00:37:04.586018 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:04.586125 kubelet[1889]: E0517 00:37:04.586032 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:04.592370 kubelet[1889]: E0517 00:37:04.592177 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:04.592370 kubelet[1889]: W0517 00:37:04.592194 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:04.592370 kubelet[1889]: E0517 00:37:04.592210 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:04.599970 kubelet[1889]: E0517 00:37:04.599945 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:04.600086 kubelet[1889]: W0517 00:37:04.600073 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:04.600188 kubelet[1889]: E0517 00:37:04.600175 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:04.605169 kubelet[1889]: E0517 00:37:04.605073 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:04.605169 kubelet[1889]: W0517 00:37:04.605089 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:04.605169 kubelet[1889]: E0517 00:37:04.605105 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:04.684224 kubelet[1889]: E0517 00:37:04.684184 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:04.684224 kubelet[1889]: W0517 00:37:04.684218 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:04.684529 kubelet[1889]: E0517 00:37:04.684248 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:04.684640 kubelet[1889]: E0517 00:37:04.684613 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:04.684640 kubelet[1889]: W0517 00:37:04.684636 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:04.684784 kubelet[1889]: E0517 00:37:04.684656 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:04.684997 kubelet[1889]: E0517 00:37:04.684974 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:04.684997 kubelet[1889]: W0517 00:37:04.684990 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:04.685210 kubelet[1889]: E0517 00:37:04.685008 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:04.685325 kubelet[1889]: E0517 00:37:04.685305 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:04.685406 kubelet[1889]: W0517 00:37:04.685325 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:04.685406 kubelet[1889]: E0517 00:37:04.685341 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:04.685636 kubelet[1889]: E0517 00:37:04.685610 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:04.685636 kubelet[1889]: W0517 00:37:04.685625 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:04.685797 kubelet[1889]: E0517 00:37:04.685643 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:04.685909 kubelet[1889]: E0517 00:37:04.685885 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:04.685909 kubelet[1889]: W0517 00:37:04.685904 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:04.686062 kubelet[1889]: E0517 00:37:04.685919 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:04.686168 kubelet[1889]: E0517 00:37:04.686148 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:04.686267 kubelet[1889]: W0517 00:37:04.686177 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:04.686267 kubelet[1889]: E0517 00:37:04.686193 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:04.686519 kubelet[1889]: E0517 00:37:04.686497 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:04.686519 kubelet[1889]: W0517 00:37:04.686514 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:04.686685 kubelet[1889]: E0517 00:37:04.686531 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:04.686830 kubelet[1889]: E0517 00:37:04.686812 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:04.686830 kubelet[1889]: W0517 00:37:04.686827 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:04.686975 kubelet[1889]: E0517 00:37:04.686842 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:04.687102 kubelet[1889]: E0517 00:37:04.687084 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:04.687102 kubelet[1889]: W0517 00:37:04.687099 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:04.687245 kubelet[1889]: E0517 00:37:04.687114 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:04.687402 kubelet[1889]: E0517 00:37:04.687384 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:04.687486 kubelet[1889]: W0517 00:37:04.687402 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:04.687486 kubelet[1889]: E0517 00:37:04.687420 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:04.687720 kubelet[1889]: E0517 00:37:04.687697 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:04.687815 kubelet[1889]: W0517 00:37:04.687722 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:04.687815 kubelet[1889]: E0517 00:37:04.687738 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:04.688011 kubelet[1889]: E0517 00:37:04.687992 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:04.688011 kubelet[1889]: W0517 00:37:04.688007 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:04.688185 kubelet[1889]: E0517 00:37:04.688022 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:04.688382 kubelet[1889]: E0517 00:37:04.688361 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:04.688382 kubelet[1889]: W0517 00:37:04.688379 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:04.688546 kubelet[1889]: E0517 00:37:04.688395 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:04.688954 kubelet[1889]: E0517 00:37:04.688930 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:04.688954 kubelet[1889]: W0517 00:37:04.688948 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:04.689126 kubelet[1889]: E0517 00:37:04.688964 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:04.689336 kubelet[1889]: E0517 00:37:04.689317 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:04.689431 kubelet[1889]: W0517 00:37:04.689336 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:04.689431 kubelet[1889]: E0517 00:37:04.689353 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:04.689671 kubelet[1889]: E0517 00:37:04.689649 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:04.689671 kubelet[1889]: W0517 00:37:04.689667 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:04.689817 kubelet[1889]: E0517 00:37:04.689683 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:04.690016 kubelet[1889]: E0517 00:37:04.689995 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:04.690016 kubelet[1889]: W0517 00:37:04.690013 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:04.690196 kubelet[1889]: E0517 00:37:04.690029 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:04.690350 kubelet[1889]: E0517 00:37:04.690327 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:04.690350 kubelet[1889]: W0517 00:37:04.690344 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:04.690485 kubelet[1889]: E0517 00:37:04.690360 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:04.690621 kubelet[1889]: E0517 00:37:04.690604 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:04.690621 kubelet[1889]: W0517 00:37:04.690619 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:04.690747 kubelet[1889]: E0517 00:37:04.690634 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:04.691398 kubelet[1889]: E0517 00:37:04.691376 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:04.691398 kubelet[1889]: W0517 00:37:04.691393 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:04.691528 kubelet[1889]: E0517 00:37:04.691411 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:04.707510 kubelet[1889]: E0517 00:37:04.707431 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:04.707510 kubelet[1889]: W0517 00:37:04.707447 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:04.707510 kubelet[1889]: E0517 00:37:04.707464 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:04.802272 env[1373]: time="2025-05-17T00:37:04.802215548Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-r4pqn,Uid:13047aa0-60d3-43ed-86c0-99f4b2f6d84c,Namespace:calico-system,Attempt:0,}" May 17 00:37:04.829132 env[1373]: time="2025-05-17T00:37:04.829092635Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-gzgl4,Uid:6ba6f9ca-5657-4a50-8f8b-036a9efb39f5,Namespace:kube-system,Attempt:0,}" May 17 00:37:05.443484 kubelet[1889]: E0517 00:37:05.443445 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:05.698691 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1400816566.mount: Deactivated successfully. May 17 00:37:05.727701 env[1373]: time="2025-05-17T00:37:05.727647095Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:05.730973 env[1373]: time="2025-05-17T00:37:05.730930905Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:05.744043 env[1373]: time="2025-05-17T00:37:05.744004945Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:05.747393 env[1373]: time="2025-05-17T00:37:05.747360455Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:05.751274 env[1373]: time="2025-05-17T00:37:05.751243467Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:05.754631 env[1373]: time="2025-05-17T00:37:05.754599277Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:05.759416 env[1373]: time="2025-05-17T00:37:05.759384792Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:05.763629 env[1373]: time="2025-05-17T00:37:05.763597004Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:05.821452 env[1373]: time="2025-05-17T00:37:05.821350479Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:37:05.821452 env[1373]: time="2025-05-17T00:37:05.821393680Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:37:05.821452 env[1373]: time="2025-05-17T00:37:05.821410780Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:37:05.822226 env[1373]: time="2025-05-17T00:37:05.822149782Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d62786d253a89cfcf654b3ada79e165d3296bf2c6edda075f6eee650faf99492 pid=1966 runtime=io.containerd.runc.v2 May 17 00:37:05.834759 env[1373]: time="2025-05-17T00:37:05.834690320Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:37:05.834997 env[1373]: time="2025-05-17T00:37:05.834969721Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:37:05.835123 env[1373]: time="2025-05-17T00:37:05.835099421Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:37:05.835423 env[1373]: time="2025-05-17T00:37:05.835374122Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/eba4353afdbbbfceb6138ceece443f1e8f20f6bcac5f37ac619e46a8f849e2ab pid=1985 runtime=io.containerd.runc.v2 May 17 00:37:05.844484 systemd[1]: Started cri-containerd-d62786d253a89cfcf654b3ada79e165d3296bf2c6edda075f6eee650faf99492.scope. May 17 00:37:05.855242 systemd[1]: Started cri-containerd-eba4353afdbbbfceb6138ceece443f1e8f20f6bcac5f37ac619e46a8f849e2ab.scope. May 17 00:37:05.880724 kernel: kauditd_printk_skb: 242 callbacks suppressed May 17 00:37:05.880870 kernel: audit: type=1400 audit(1747442225.868:419): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.902176 kernel: audit: type=1400 audit(1747442225.868:420): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.902252 kernel: audit: type=1400 audit(1747442225.868:421): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.902289 kernel: audit: type=1400 audit(1747442225.868:422): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.912025 kernel: audit: type=1400 audit(1747442225.868:423): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.933051 kernel: audit: type=1400 audit(1747442225.868:424): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.956849 kernel: audit: type=1400 audit(1747442225.868:425): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.956955 kernel: audit: type=1400 audit(1747442225.868:426): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.975178 env[1373]: time="2025-05-17T00:37:05.974919745Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-gzgl4,Uid:6ba6f9ca-5657-4a50-8f8b-036a9efb39f5,Namespace:kube-system,Attempt:0,} returns sandbox id \"d62786d253a89cfcf654b3ada79e165d3296bf2c6edda075f6eee650faf99492\"" May 17 00:37:05.977815 env[1373]: time="2025-05-17T00:37:05.977791654Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.1\"" May 17 00:37:05.981910 kernel: audit: type=1400 audit(1747442225.868:427): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.981991 kernel: audit: type=1400 audit(1747442225.879:428): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.879000 audit: BPF prog-id=56 op=LOAD May 17 00:37:05.880000 audit[1981]: AVC avc: denied { bpf } for pid=1981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.880000 audit[1981]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1966 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:05.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436323738366432353361383963666366363534623361646137396531 May 17 00:37:05.880000 audit[1981]: AVC avc: denied { perfmon } for pid=1981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.880000 audit[1981]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1966 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:05.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436323738366432353361383963666366363534623361646137396531 May 17 00:37:05.880000 audit[1981]: AVC avc: denied { bpf } for pid=1981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.880000 audit[1981]: AVC avc: denied { bpf } for pid=1981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.880000 audit[1981]: AVC avc: denied { bpf } for pid=1981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.880000 audit[1981]: AVC avc: denied { perfmon } for pid=1981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.880000 audit[1981]: AVC avc: denied { perfmon } for pid=1981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.880000 audit[1981]: AVC avc: denied { perfmon } for pid=1981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.880000 audit[1981]: AVC avc: denied { perfmon } for pid=1981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.880000 audit[1981]: AVC avc: denied { perfmon } for pid=1981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.880000 audit[1981]: AVC avc: denied { bpf } for pid=1981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.880000 audit[1981]: AVC avc: denied { bpf } for pid=1981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.880000 audit: BPF prog-id=57 op=LOAD May 17 00:37:05.880000 audit[1981]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000250b60 items=0 ppid=1966 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:05.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436323738366432353361383963666366363534623361646137396531 May 17 00:37:05.880000 audit[1981]: AVC avc: denied { bpf } for pid=1981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.880000 audit[1981]: AVC avc: denied { bpf } for pid=1981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.880000 audit[1981]: AVC avc: denied { perfmon } for pid=1981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.880000 audit[1981]: AVC avc: denied { perfmon } for pid=1981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.880000 audit[1981]: AVC avc: denied { perfmon } for pid=1981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.880000 audit[1981]: AVC avc: denied { perfmon } for pid=1981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.880000 audit[1981]: AVC avc: denied { perfmon } for pid=1981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.880000 audit[1981]: AVC avc: denied { bpf } for pid=1981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.880000 audit[1981]: AVC avc: denied { bpf } for pid=1981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.880000 audit: BPF prog-id=58 op=LOAD May 17 00:37:05.880000 audit[1981]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000250ba8 items=0 ppid=1966 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:05.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436323738366432353361383963666366363534623361646137396531 May 17 00:37:05.889000 audit: BPF prog-id=58 op=UNLOAD May 17 00:37:05.889000 audit: BPF prog-id=57 op=UNLOAD May 17 00:37:05.889000 audit[1981]: AVC avc: denied { bpf } for pid=1981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.889000 audit[1981]: AVC avc: denied { bpf } for pid=1981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.889000 audit[1981]: AVC avc: denied { bpf } for pid=1981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.889000 audit[1981]: AVC avc: denied { perfmon } for pid=1981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.889000 audit[1981]: AVC avc: denied { perfmon } for pid=1981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.889000 audit[1981]: AVC avc: denied { perfmon } for pid=1981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.889000 audit[1981]: AVC avc: denied { perfmon } for pid=1981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.889000 audit[1981]: AVC avc: denied { perfmon } for pid=1981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.889000 audit[1981]: AVC avc: denied { bpf } for pid=1981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.889000 audit[1981]: AVC avc: denied { bpf } for pid=1981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.889000 audit: BPF prog-id=59 op=LOAD May 17 00:37:05.889000 audit[1981]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000250fb8 items=0 ppid=1966 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:05.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436323738366432353361383963666366363534623361646137396531 May 17 00:37:05.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.962000 audit: BPF prog-id=60 op=LOAD May 17 00:37:05.962000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.962000 audit[2001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1985 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:05.962000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562613433353361666462626266636562363133386365656365343433 May 17 00:37:05.981000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.981000 audit[2001]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1985 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:05.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562613433353361666462626266636562363133386365656365343433 May 17 00:37:05.981000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.981000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.981000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.981000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.981000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.981000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.981000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.981000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.981000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.981000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.981000 audit: BPF prog-id=61 op=LOAD May 17 00:37:05.981000 audit[2001]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000195fa0 items=0 ppid=1985 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:05.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562613433353361666462626266636562363133386365656365343433 May 17 00:37:05.981000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.981000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.981000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.981000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.981000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.981000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.981000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.981000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.981000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.981000 audit: BPF prog-id=62 op=LOAD May 17 00:37:05.981000 audit[2001]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000195fe8 items=0 ppid=1985 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:05.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562613433353361666462626266636562363133386365656365343433 May 17 00:37:05.981000 audit: BPF prog-id=62 op=UNLOAD May 17 00:37:05.981000 audit: BPF prog-id=61 op=UNLOAD May 17 00:37:05.981000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.981000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.981000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.981000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.981000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.981000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.981000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.981000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.981000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.981000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:05.981000 audit: BPF prog-id=63 op=LOAD May 17 00:37:05.981000 audit[2001]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001d63f8 items=0 ppid=1985 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:05.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562613433353361666462626266636562363133386365656365343433 May 17 00:37:05.995615 env[1373]: time="2025-05-17T00:37:05.995465708Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-r4pqn,Uid:13047aa0-60d3-43ed-86c0-99f4b2f6d84c,Namespace:calico-system,Attempt:0,} returns sandbox id \"eba4353afdbbbfceb6138ceece443f1e8f20f6bcac5f37ac619e46a8f849e2ab\"" May 17 00:37:06.444162 kubelet[1889]: E0517 00:37:06.444078 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:06.503878 kubelet[1889]: E0517 00:37:06.503837 1889 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mjvqz" podUID="4c0874f4-3d52-4bc3-91d1-2863ef2820cc" May 17 00:37:07.391363 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1479770996.mount: Deactivated successfully. May 17 00:37:07.445233 kubelet[1889]: E0517 00:37:07.445193 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:08.072803 env[1373]: time="2025-05-17T00:37:08.072744513Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:08.077668 env[1373]: time="2025-05-17T00:37:08.077626225Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b79c189b052cdbe0e837d0caa6faf1d9fd696d8664fcc462f67d9ea51f26fef2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:08.080663 env[1373]: time="2025-05-17T00:37:08.080629132Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:08.083345 env[1373]: time="2025-05-17T00:37:08.083315139Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:7ddf379897139ae8ade8b33cb9373b70c632a4d5491da6e234f5d830e0a50807,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:08.083698 env[1373]: time="2025-05-17T00:37:08.083664840Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.1\" returns image reference \"sha256:b79c189b052cdbe0e837d0caa6faf1d9fd696d8664fcc462f67d9ea51f26fef2\"" May 17 00:37:08.085617 env[1373]: time="2025-05-17T00:37:08.085053543Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\"" May 17 00:37:08.090677 env[1373]: time="2025-05-17T00:37:08.090647257Z" level=info msg="CreateContainer within sandbox \"d62786d253a89cfcf654b3ada79e165d3296bf2c6edda075f6eee650faf99492\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 17 00:37:08.119485 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2897673127.mount: Deactivated successfully. May 17 00:37:08.126271 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4000746113.mount: Deactivated successfully. May 17 00:37:08.148670 env[1373]: time="2025-05-17T00:37:08.148623502Z" level=info msg="CreateContainer within sandbox \"d62786d253a89cfcf654b3ada79e165d3296bf2c6edda075f6eee650faf99492\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"c7431340729c654d79674c31deb2d97ccc3d9f2218512059227cebade324b866\"" May 17 00:37:08.149384 env[1373]: time="2025-05-17T00:37:08.149303204Z" level=info msg="StartContainer for \"c7431340729c654d79674c31deb2d97ccc3d9f2218512059227cebade324b866\"" May 17 00:37:08.170393 systemd[1]: Started cri-containerd-c7431340729c654d79674c31deb2d97ccc3d9f2218512059227cebade324b866.scope. May 17 00:37:08.185000 audit[2055]: AVC avc: denied { perfmon } for pid=2055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.185000 audit[2055]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fbf2ca534d8 items=0 ppid=1966 pid=2055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.185000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337343331333430373239633635346437393637346333316465623264 May 17 00:37:08.186000 audit[2055]: AVC avc: denied { bpf } for pid=2055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.186000 audit[2055]: AVC avc: denied { bpf } for pid=2055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.186000 audit[2055]: AVC avc: denied { bpf } for pid=2055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.186000 audit[2055]: AVC avc: denied { perfmon } for pid=2055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.186000 audit[2055]: AVC avc: denied { perfmon } for pid=2055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.186000 audit[2055]: AVC avc: denied { perfmon } for pid=2055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.186000 audit[2055]: AVC avc: denied { perfmon } for pid=2055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.186000 audit[2055]: AVC avc: denied { perfmon } for pid=2055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.186000 audit[2055]: AVC avc: denied { bpf } for pid=2055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.186000 audit[2055]: AVC avc: denied { bpf } for pid=2055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.186000 audit: BPF prog-id=64 op=LOAD May 17 00:37:08.186000 audit[2055]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000218d88 items=0 ppid=1966 pid=2055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.186000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337343331333430373239633635346437393637346333316465623264 May 17 00:37:08.186000 audit[2055]: AVC avc: denied { bpf } for pid=2055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.186000 audit[2055]: AVC avc: denied { bpf } for pid=2055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.186000 audit[2055]: AVC avc: denied { perfmon } for pid=2055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.186000 audit[2055]: AVC avc: denied { perfmon } for pid=2055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.186000 audit[2055]: AVC avc: denied { perfmon } for pid=2055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.186000 audit[2055]: AVC avc: denied { perfmon } for pid=2055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.186000 audit[2055]: AVC avc: denied { perfmon } for pid=2055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.186000 audit[2055]: AVC avc: denied { bpf } for pid=2055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.186000 audit[2055]: AVC avc: denied { bpf } for pid=2055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.186000 audit: BPF prog-id=65 op=LOAD May 17 00:37:08.186000 audit[2055]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000218dd8 items=0 ppid=1966 pid=2055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.186000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337343331333430373239633635346437393637346333316465623264 May 17 00:37:08.186000 audit: BPF prog-id=65 op=UNLOAD May 17 00:37:08.186000 audit: BPF prog-id=64 op=UNLOAD May 17 00:37:08.186000 audit[2055]: AVC avc: denied { bpf } for pid=2055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.186000 audit[2055]: AVC avc: denied { bpf } for pid=2055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.186000 audit[2055]: AVC avc: denied { bpf } for pid=2055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.186000 audit[2055]: AVC avc: denied { perfmon } for pid=2055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.186000 audit[2055]: AVC avc: denied { perfmon } for pid=2055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.186000 audit[2055]: AVC avc: denied { perfmon } for pid=2055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.186000 audit[2055]: AVC avc: denied { perfmon } for pid=2055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.186000 audit[2055]: AVC avc: denied { perfmon } for pid=2055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.186000 audit[2055]: AVC avc: denied { bpf } for pid=2055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.186000 audit[2055]: AVC avc: denied { bpf } for pid=2055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.186000 audit: BPF prog-id=66 op=LOAD May 17 00:37:08.186000 audit[2055]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000218e68 items=0 ppid=1966 pid=2055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.186000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337343331333430373239633635346437393637346333316465623264 May 17 00:37:08.210433 env[1373]: time="2025-05-17T00:37:08.210361257Z" level=info msg="StartContainer for \"c7431340729c654d79674c31deb2d97ccc3d9f2218512059227cebade324b866\" returns successfully" May 17 00:37:08.314000 audit[2115]: NETFILTER_CFG table=mangle:21 family=2 entries=1 op=nft_register_chain pid=2115 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:08.314000 audit[2115]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff663e27d0 a2=0 a3=7fff663e27bc items=0 ppid=2066 pid=2115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.314000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:37:08.316000 audit[2116]: NETFILTER_CFG table=nat:22 family=2 entries=1 op=nft_register_chain pid=2116 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:08.316000 audit[2116]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff8706e170 a2=0 a3=7fff8706e15c items=0 ppid=2066 pid=2116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.316000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:37:08.317000 audit[2117]: NETFILTER_CFG table=mangle:23 family=10 entries=1 op=nft_register_chain pid=2117 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:08.317000 audit[2117]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd4e4c6560 a2=0 a3=7ffd4e4c654c items=0 ppid=2066 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.317000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:37:08.317000 audit[2118]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_chain pid=2118 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:08.317000 audit[2118]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc11b25a30 a2=0 a3=7ffc11b25a1c items=0 ppid=2066 pid=2118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.317000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 00:37:08.318000 audit[2119]: NETFILTER_CFG table=nat:25 family=10 entries=1 op=nft_register_chain pid=2119 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:08.318000 audit[2119]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc42302130 a2=0 a3=7ffc4230211c items=0 ppid=2066 pid=2119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.318000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:37:08.320000 audit[2121]: NETFILTER_CFG table=filter:26 family=10 entries=1 op=nft_register_chain pid=2121 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:08.320000 audit[2121]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcdb2944d0 a2=0 a3=7ffcdb2944bc items=0 ppid=2066 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.320000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 00:37:08.423000 audit[2123]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2123 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:08.423000 audit[2123]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fffcfe29840 a2=0 a3=7fffcfe2982c items=0 ppid=2066 pid=2123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.423000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 00:37:08.426000 audit[2125]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_rule pid=2125 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:08.426000 audit[2125]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffff8704490 a2=0 a3=7ffff870447c items=0 ppid=2066 pid=2125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.426000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 17 00:37:08.430000 audit[2128]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2128 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:08.430000 audit[2128]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc7522a230 a2=0 a3=7ffc7522a21c items=0 ppid=2066 pid=2128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.430000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 17 00:37:08.431000 audit[2129]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2129 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:08.431000 audit[2129]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe82c459e0 a2=0 a3=7ffe82c459cc items=0 ppid=2066 pid=2129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.431000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 00:37:08.433000 audit[2131]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=2131 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:08.433000 audit[2131]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe003338d0 a2=0 a3=7ffe003338bc items=0 ppid=2066 pid=2131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.433000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 00:37:08.434000 audit[2132]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_chain pid=2132 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:08.434000 audit[2132]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff436ee010 a2=0 a3=7fff436edffc items=0 ppid=2066 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.434000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 00:37:08.437000 audit[2134]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2134 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:08.437000 audit[2134]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd78eec260 a2=0 a3=7ffd78eec24c items=0 ppid=2066 pid=2134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.437000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 00:37:08.440000 audit[2137]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_rule pid=2137 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:08.440000 audit[2137]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffda374a160 a2=0 a3=7ffda374a14c items=0 ppid=2066 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.440000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 17 00:37:08.442000 audit[2138]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=2138 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:08.442000 audit[2138]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcd1a14280 a2=0 a3=7ffcd1a1426c items=0 ppid=2066 pid=2138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.442000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 00:37:08.445964 kubelet[1889]: E0517 00:37:08.445937 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:08.444000 audit[2140]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_rule pid=2140 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:08.444000 audit[2140]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc9ae1b360 a2=0 a3=7ffc9ae1b34c items=0 ppid=2066 pid=2140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.444000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 00:37:08.446000 audit[2141]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_chain pid=2141 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:08.446000 audit[2141]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff050e1310 a2=0 a3=7fff050e12fc items=0 ppid=2066 pid=2141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.446000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 00:37:08.448000 audit[2143]: NETFILTER_CFG table=filter:38 family=2 entries=1 op=nft_register_rule pid=2143 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:08.448000 audit[2143]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff254760c0 a2=0 a3=7fff254760ac items=0 ppid=2066 pid=2143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.448000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:37:08.452000 audit[2146]: NETFILTER_CFG table=filter:39 family=2 entries=1 op=nft_register_rule pid=2146 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:08.452000 audit[2146]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffda8f79b50 a2=0 a3=7ffda8f79b3c items=0 ppid=2066 pid=2146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.452000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:37:08.455000 audit[2149]: NETFILTER_CFG table=filter:40 family=2 entries=1 op=nft_register_rule pid=2149 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:08.455000 audit[2149]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc46b24a60 a2=0 a3=7ffc46b24a4c items=0 ppid=2066 pid=2149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.455000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 00:37:08.456000 audit[2150]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_chain pid=2150 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:08.456000 audit[2150]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff3d61cfc0 a2=0 a3=7fff3d61cfac items=0 ppid=2066 pid=2150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.456000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 00:37:08.458000 audit[2152]: NETFILTER_CFG table=nat:42 family=2 entries=2 op=nft_register_chain pid=2152 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:08.458000 audit[2152]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe1dd5fc80 a2=0 a3=7ffe1dd5fc6c items=0 ppid=2066 pid=2152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.458000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:37:08.491000 audit[2156]: NETFILTER_CFG table=nat:43 family=2 entries=2 op=nft_register_chain pid=2156 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:08.491000 audit[2156]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff90bc5180 a2=0 a3=7fff90bc516c items=0 ppid=2066 pid=2156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.491000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:37:08.492000 audit[2157]: NETFILTER_CFG table=nat:44 family=2 entries=1 op=nft_register_chain pid=2157 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:08.492000 audit[2157]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffee27f89e0 a2=0 a3=7ffee27f89cc items=0 ppid=2066 pid=2157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.492000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 00:37:08.494000 audit[2159]: NETFILTER_CFG table=nat:45 family=2 entries=2 op=nft_register_chain pid=2159 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:08.494000 audit[2159]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff087a14d0 a2=0 a3=7fff087a14bc items=0 ppid=2066 pid=2159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.494000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 00:37:08.503505 kubelet[1889]: E0517 00:37:08.503464 1889 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mjvqz" podUID="4c0874f4-3d52-4bc3-91d1-2863ef2820cc" May 17 00:37:08.535000 audit[2165]: NETFILTER_CFG table=filter:46 family=2 entries=7 op=nft_register_rule pid=2165 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:08.535000 audit[2165]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7fff88756cd0 a2=0 a3=7fff88756cbc items=0 ppid=2066 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.535000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:08.573000 audit[2165]: NETFILTER_CFG table=nat:47 family=2 entries=65 op=nft_register_chain pid=2165 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:08.573000 audit[2165]: SYSCALL arch=c000003e syscall=46 success=yes exit=30940 a0=3 a1=7fff88756cd0 a2=0 a3=7fff88756cbc items=0 ppid=2066 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.573000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:08.591000 audit[2174]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_chain pid=2174 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:08.591000 audit[2174]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe4507b490 a2=0 a3=7ffe4507b47c items=0 ppid=2066 pid=2174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.591000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 00:37:08.593000 audit[2176]: NETFILTER_CFG table=filter:49 family=10 entries=2 op=nft_register_chain pid=2176 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:08.593000 audit[2176]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe148aa0a0 a2=0 a3=7ffe148aa08c items=0 ppid=2066 pid=2176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.593000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 17 00:37:08.600414 kubelet[1889]: E0517 00:37:08.600382 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:08.600414 kubelet[1889]: W0517 00:37:08.600413 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:08.600592 kubelet[1889]: E0517 00:37:08.600439 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:08.600657 kubelet[1889]: E0517 00:37:08.600639 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:08.600708 kubelet[1889]: W0517 00:37:08.600656 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:08.600708 kubelet[1889]: E0517 00:37:08.600670 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:08.600865 kubelet[1889]: E0517 00:37:08.600847 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:08.600865 kubelet[1889]: W0517 00:37:08.600864 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:08.600980 kubelet[1889]: E0517 00:37:08.600877 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:08.601127 kubelet[1889]: E0517 00:37:08.601109 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:08.601127 kubelet[1889]: W0517 00:37:08.601124 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:08.601270 kubelet[1889]: E0517 00:37:08.601146 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:08.601366 kubelet[1889]: E0517 00:37:08.601348 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:08.601366 kubelet[1889]: W0517 00:37:08.601365 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:08.601491 kubelet[1889]: E0517 00:37:08.601378 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:08.601571 kubelet[1889]: E0517 00:37:08.601554 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:08.601571 kubelet[1889]: W0517 00:37:08.601570 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:08.601697 kubelet[1889]: E0517 00:37:08.601582 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:08.601780 kubelet[1889]: E0517 00:37:08.601763 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:08.601780 kubelet[1889]: W0517 00:37:08.601778 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:08.601900 kubelet[1889]: E0517 00:37:08.601791 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:08.601987 kubelet[1889]: E0517 00:37:08.601971 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:08.601987 kubelet[1889]: W0517 00:37:08.601987 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:08.602121 kubelet[1889]: E0517 00:37:08.601999 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:08.602216 kubelet[1889]: E0517 00:37:08.602202 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:08.602216 kubelet[1889]: W0517 00:37:08.602212 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:08.602302 kubelet[1889]: E0517 00:37:08.602225 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:08.602412 kubelet[1889]: E0517 00:37:08.602394 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:08.602412 kubelet[1889]: W0517 00:37:08.602410 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:08.602546 kubelet[1889]: E0517 00:37:08.602422 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:08.602607 kubelet[1889]: E0517 00:37:08.602591 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:08.602607 kubelet[1889]: W0517 00:37:08.602604 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:08.602728 kubelet[1889]: E0517 00:37:08.602616 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:08.602804 kubelet[1889]: E0517 00:37:08.602788 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:08.602864 kubelet[1889]: W0517 00:37:08.602804 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:08.602864 kubelet[1889]: E0517 00:37:08.602816 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:08.603018 kubelet[1889]: E0517 00:37:08.603000 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:08.603018 kubelet[1889]: W0517 00:37:08.603016 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:08.603154 kubelet[1889]: E0517 00:37:08.603029 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:08.603230 kubelet[1889]: E0517 00:37:08.603215 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:08.603281 kubelet[1889]: W0517 00:37:08.603232 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:08.603281 kubelet[1889]: E0517 00:37:08.603244 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:08.603433 kubelet[1889]: E0517 00:37:08.603418 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:08.603494 kubelet[1889]: W0517 00:37:08.603433 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:08.603494 kubelet[1889]: E0517 00:37:08.603445 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:08.603640 kubelet[1889]: E0517 00:37:08.603623 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:08.603708 kubelet[1889]: W0517 00:37:08.603640 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:08.603708 kubelet[1889]: E0517 00:37:08.603652 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:08.603855 kubelet[1889]: E0517 00:37:08.603838 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:08.603855 kubelet[1889]: W0517 00:37:08.603854 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:08.603972 kubelet[1889]: E0517 00:37:08.603866 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:08.604053 kubelet[1889]: E0517 00:37:08.604039 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:08.604117 kubelet[1889]: W0517 00:37:08.604054 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:08.604117 kubelet[1889]: E0517 00:37:08.604065 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:08.604308 kubelet[1889]: E0517 00:37:08.604291 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:08.604379 kubelet[1889]: W0517 00:37:08.604310 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:08.604379 kubelet[1889]: E0517 00:37:08.604322 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:08.604511 kubelet[1889]: E0517 00:37:08.604496 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:08.604575 kubelet[1889]: W0517 00:37:08.604511 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:08.604575 kubelet[1889]: E0517 00:37:08.604523 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:08.604000 audit[2179]: NETFILTER_CFG table=filter:50 family=10 entries=2 op=nft_register_chain pid=2179 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:08.604000 audit[2179]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff080c1520 a2=0 a3=7fff080c150c items=0 ppid=2066 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.604000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 17 00:37:08.605000 audit[2201]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=2201 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:08.605000 audit[2201]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeb0203f20 a2=0 a3=7ffeb0203f0c items=0 ppid=2066 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.605000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 00:37:08.608000 audit[2203]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=2203 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:08.608000 audit[2203]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe4c8266a0 a2=0 a3=7ffe4c82668c items=0 ppid=2066 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.608000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 00:37:08.609000 audit[2204]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_chain pid=2204 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:08.609000 audit[2204]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd59ae6ee0 a2=0 a3=7ffd59ae6ecc items=0 ppid=2066 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.609000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 00:37:08.612000 audit[2206]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=2206 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:08.612000 audit[2206]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe426a9db0 a2=0 a3=7ffe426a9d9c items=0 ppid=2066 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.612000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 17 00:37:08.615000 audit[2209]: NETFILTER_CFG table=filter:55 family=10 entries=2 op=nft_register_chain pid=2209 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:08.615000 audit[2209]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd94cddcf0 a2=0 a3=7ffd94cddcdc items=0 ppid=2066 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.615000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 00:37:08.616000 audit[2210]: NETFILTER_CFG table=filter:56 family=10 entries=1 op=nft_register_chain pid=2210 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:08.616000 audit[2210]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff70d28510 a2=0 a3=7fff70d284fc items=0 ppid=2066 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.616000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 00:37:08.619000 audit[2212]: NETFILTER_CFG table=filter:57 family=10 entries=1 op=nft_register_rule pid=2212 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:08.619000 audit[2212]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd569b28c0 a2=0 a3=7ffd569b28ac items=0 ppid=2066 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.619000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 00:37:08.620000 audit[2213]: NETFILTER_CFG table=filter:58 family=10 entries=1 op=nft_register_chain pid=2213 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:08.620000 audit[2213]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff001590f0 a2=0 a3=7fff001590dc items=0 ppid=2066 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.620000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 00:37:08.623995 kubelet[1889]: E0517 00:37:08.623973 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:08.624169 kubelet[1889]: W0517 00:37:08.624149 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:08.624279 kubelet[1889]: E0517 00:37:08.624264 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:08.622000 audit[2215]: NETFILTER_CFG table=filter:59 family=10 entries=1 op=nft_register_rule pid=2215 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:08.622000 audit[2215]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc7f87d7a0 a2=0 a3=7ffc7f87d78c items=0 ppid=2066 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.622000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:37:08.624724 kubelet[1889]: E0517 00:37:08.624701 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:08.624788 kubelet[1889]: W0517 00:37:08.624716 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:08.624788 kubelet[1889]: E0517 00:37:08.624740 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:08.627730 kubelet[1889]: E0517 00:37:08.624999 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:08.627730 kubelet[1889]: W0517 00:37:08.625014 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:08.627730 kubelet[1889]: E0517 00:37:08.625033 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:08.627730 kubelet[1889]: E0517 00:37:08.625317 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:08.627730 kubelet[1889]: W0517 00:37:08.625330 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:08.627730 kubelet[1889]: E0517 00:37:08.625343 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:08.627730 kubelet[1889]: E0517 00:37:08.625555 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:08.627730 kubelet[1889]: W0517 00:37:08.625566 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:08.627730 kubelet[1889]: E0517 00:37:08.625578 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:08.627730 kubelet[1889]: E0517 00:37:08.625822 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:08.628243 kubelet[1889]: W0517 00:37:08.625835 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:08.628243 kubelet[1889]: E0517 00:37:08.625848 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:08.628243 kubelet[1889]: E0517 00:37:08.626302 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:08.628243 kubelet[1889]: W0517 00:37:08.626314 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:08.628243 kubelet[1889]: E0517 00:37:08.626329 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:08.628243 kubelet[1889]: E0517 00:37:08.626555 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:08.628243 kubelet[1889]: W0517 00:37:08.626567 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:08.628243 kubelet[1889]: E0517 00:37:08.626590 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:08.628243 kubelet[1889]: E0517 00:37:08.626845 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:08.628243 kubelet[1889]: W0517 00:37:08.626856 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:08.628641 kubelet[1889]: E0517 00:37:08.626869 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:08.628641 kubelet[1889]: E0517 00:37:08.627045 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:08.628641 kubelet[1889]: W0517 00:37:08.627056 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:08.628641 kubelet[1889]: E0517 00:37:08.627067 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:08.628641 kubelet[1889]: E0517 00:37:08.627286 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:08.628641 kubelet[1889]: W0517 00:37:08.627297 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:08.628641 kubelet[1889]: E0517 00:37:08.627311 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:08.628641 kubelet[1889]: E0517 00:37:08.627672 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:08.628641 kubelet[1889]: W0517 00:37:08.627683 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:08.628641 kubelet[1889]: E0517 00:37:08.627697 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:08.628000 audit[2230]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_rule pid=2230 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:08.628000 audit[2230]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd47c285a0 a2=0 a3=7ffd47c2858c items=0 ppid=2066 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.628000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 00:37:08.631000 audit[2233]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=2233 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:08.631000 audit[2233]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe330b49a0 a2=0 a3=7ffe330b498c items=0 ppid=2066 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.631000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 17 00:37:08.632000 audit[2234]: NETFILTER_CFG table=nat:62 family=10 entries=1 op=nft_register_chain pid=2234 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:08.632000 audit[2234]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff6368e0c0 a2=0 a3=7fff6368e0ac items=0 ppid=2066 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.632000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 00:37:08.635000 audit[2236]: NETFILTER_CFG table=nat:63 family=10 entries=2 op=nft_register_chain pid=2236 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:08.635000 audit[2236]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff9d5df150 a2=0 a3=7fff9d5df13c items=0 ppid=2066 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.635000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:37:08.638000 audit[2239]: NETFILTER_CFG table=nat:64 family=10 entries=2 op=nft_register_chain pid=2239 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:08.638000 audit[2239]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc97d78d40 a2=0 a3=7ffc97d78d2c items=0 ppid=2066 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.638000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:37:08.639000 audit[2240]: NETFILTER_CFG table=nat:65 family=10 entries=1 op=nft_register_chain pid=2240 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:08.639000 audit[2240]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcdf370fc0 a2=0 a3=7ffcdf370fac items=0 ppid=2066 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.639000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 00:37:08.641000 audit[2242]: NETFILTER_CFG table=nat:66 family=10 entries=2 op=nft_register_chain pid=2242 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:08.641000 audit[2242]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd7e3b6260 a2=0 a3=7ffd7e3b624c items=0 ppid=2066 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.641000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 00:37:08.643000 audit[2243]: NETFILTER_CFG table=filter:67 family=10 entries=1 op=nft_register_chain pid=2243 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:08.643000 audit[2243]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffde8fa3ef0 a2=0 a3=7ffde8fa3edc items=0 ppid=2066 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.643000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 00:37:08.647000 audit[2245]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_rule pid=2245 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:08.647000 audit[2245]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff16f72590 a2=0 a3=7fff16f7257c items=0 ppid=2066 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.647000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:37:08.653000 audit[2248]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2248 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:08.653000 audit[2248]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc452d1750 a2=0 a3=7ffc452d173c items=0 ppid=2066 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.653000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:37:08.656000 audit[2250]: NETFILTER_CFG table=filter:70 family=10 entries=3 op=nft_register_rule pid=2250 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 00:37:08.656000 audit[2250]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffd333e4f20 a2=0 a3=7ffd333e4f0c items=0 ppid=2066 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.656000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:08.656000 audit[2250]: NETFILTER_CFG table=nat:71 family=10 entries=7 op=nft_register_chain pid=2250 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 00:37:08.656000 audit[2250]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffd333e4f20 a2=0 a3=7ffd333e4f0c items=0 ppid=2066 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.656000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:09.422669 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2343334724.mount: Deactivated successfully. May 17 00:37:09.447290 kubelet[1889]: E0517 00:37:09.447225 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:09.611780 kubelet[1889]: E0517 00:37:09.611738 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:09.611780 kubelet[1889]: W0517 00:37:09.611763 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:09.611780 kubelet[1889]: E0517 00:37:09.611786 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:09.612065 kubelet[1889]: E0517 00:37:09.612015 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:09.612065 kubelet[1889]: W0517 00:37:09.612029 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:09.612065 kubelet[1889]: E0517 00:37:09.612045 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:09.612286 kubelet[1889]: E0517 00:37:09.612264 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:09.612286 kubelet[1889]: W0517 00:37:09.612280 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:09.612416 kubelet[1889]: E0517 00:37:09.612293 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:09.612505 kubelet[1889]: E0517 00:37:09.612489 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:09.612505 kubelet[1889]: W0517 00:37:09.612502 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:09.612618 kubelet[1889]: E0517 00:37:09.612515 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:09.612737 kubelet[1889]: E0517 00:37:09.612712 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:09.612737 kubelet[1889]: W0517 00:37:09.612725 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:09.612857 kubelet[1889]: E0517 00:37:09.612738 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:09.612924 kubelet[1889]: E0517 00:37:09.612909 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:09.612972 kubelet[1889]: W0517 00:37:09.612926 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:09.612972 kubelet[1889]: E0517 00:37:09.612938 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:09.613130 kubelet[1889]: E0517 00:37:09.613110 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:09.613198 kubelet[1889]: W0517 00:37:09.613185 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:09.614561 kubelet[1889]: E0517 00:37:09.613202 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:09.614561 kubelet[1889]: E0517 00:37:09.613430 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:09.614561 kubelet[1889]: W0517 00:37:09.613439 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:09.614561 kubelet[1889]: E0517 00:37:09.613449 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:09.614561 kubelet[1889]: E0517 00:37:09.613622 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:09.614561 kubelet[1889]: W0517 00:37:09.613630 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:09.614561 kubelet[1889]: E0517 00:37:09.613638 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:09.614561 kubelet[1889]: E0517 00:37:09.613799 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:09.614561 kubelet[1889]: W0517 00:37:09.613806 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:09.614561 kubelet[1889]: E0517 00:37:09.613814 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:09.615037 kubelet[1889]: E0517 00:37:09.613982 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:09.615037 kubelet[1889]: W0517 00:37:09.613990 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:09.615037 kubelet[1889]: E0517 00:37:09.614000 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:09.615037 kubelet[1889]: E0517 00:37:09.614185 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:09.615037 kubelet[1889]: W0517 00:37:09.614193 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:09.615037 kubelet[1889]: E0517 00:37:09.614201 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:09.615037 kubelet[1889]: E0517 00:37:09.614375 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:09.615037 kubelet[1889]: W0517 00:37:09.614383 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:09.615037 kubelet[1889]: E0517 00:37:09.614391 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:09.615037 kubelet[1889]: E0517 00:37:09.614593 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:09.615501 kubelet[1889]: W0517 00:37:09.614604 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:09.615501 kubelet[1889]: E0517 00:37:09.614616 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:09.615501 kubelet[1889]: E0517 00:37:09.614802 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:09.615501 kubelet[1889]: W0517 00:37:09.614811 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:09.615501 kubelet[1889]: E0517 00:37:09.614823 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:09.615501 kubelet[1889]: E0517 00:37:09.615008 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:09.615501 kubelet[1889]: W0517 00:37:09.615018 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:09.615501 kubelet[1889]: E0517 00:37:09.615029 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:09.615501 kubelet[1889]: E0517 00:37:09.615263 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:09.615501 kubelet[1889]: W0517 00:37:09.615275 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:09.615941 kubelet[1889]: E0517 00:37:09.615287 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:09.615941 kubelet[1889]: E0517 00:37:09.615473 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:09.615941 kubelet[1889]: W0517 00:37:09.615482 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:09.615941 kubelet[1889]: E0517 00:37:09.615493 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:09.615941 kubelet[1889]: E0517 00:37:09.615676 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:09.615941 kubelet[1889]: W0517 00:37:09.615685 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:09.615941 kubelet[1889]: E0517 00:37:09.615696 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:09.615941 kubelet[1889]: E0517 00:37:09.615898 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:09.615941 kubelet[1889]: W0517 00:37:09.615908 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:09.615941 kubelet[1889]: E0517 00:37:09.615920 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:09.631149 env[1373]: time="2025-05-17T00:37:09.631093809Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:09.632891 kubelet[1889]: E0517 00:37:09.632868 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:09.632891 kubelet[1889]: W0517 00:37:09.632887 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:09.633078 kubelet[1889]: E0517 00:37:09.632905 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:09.633211 kubelet[1889]: E0517 00:37:09.633196 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:09.633211 kubelet[1889]: W0517 00:37:09.633210 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:09.633321 kubelet[1889]: E0517 00:37:09.633225 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:09.633623 kubelet[1889]: E0517 00:37:09.633481 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:09.633623 kubelet[1889]: W0517 00:37:09.633496 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:09.633623 kubelet[1889]: E0517 00:37:09.633511 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:09.633829 kubelet[1889]: E0517 00:37:09.633813 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:09.633829 kubelet[1889]: W0517 00:37:09.633826 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:09.633958 kubelet[1889]: E0517 00:37:09.633839 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:09.634042 kubelet[1889]: E0517 00:37:09.634024 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:09.634042 kubelet[1889]: W0517 00:37:09.634038 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:09.634177 kubelet[1889]: E0517 00:37:09.634053 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:09.634286 kubelet[1889]: E0517 00:37:09.634270 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:09.634339 kubelet[1889]: W0517 00:37:09.634288 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:09.634339 kubelet[1889]: E0517 00:37:09.634304 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:09.634738 kubelet[1889]: E0517 00:37:09.634720 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:09.634738 kubelet[1889]: W0517 00:37:09.634737 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:09.634875 kubelet[1889]: E0517 00:37:09.634751 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:09.634967 kubelet[1889]: E0517 00:37:09.634951 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:09.635043 kubelet[1889]: W0517 00:37:09.634968 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:09.635043 kubelet[1889]: E0517 00:37:09.634981 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:09.635256 kubelet[1889]: E0517 00:37:09.635240 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:09.635256 kubelet[1889]: W0517 00:37:09.635256 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:09.635382 kubelet[1889]: E0517 00:37:09.635269 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:09.635512 kubelet[1889]: E0517 00:37:09.635496 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:09.635579 kubelet[1889]: W0517 00:37:09.635513 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:09.635579 kubelet[1889]: E0517 00:37:09.635526 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:09.635914 kubelet[1889]: E0517 00:37:09.635896 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:09.635914 kubelet[1889]: W0517 00:37:09.635914 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:09.636060 kubelet[1889]: E0517 00:37:09.635927 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:09.636117 kubelet[1889]: E0517 00:37:09.636106 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:09.636117 kubelet[1889]: W0517 00:37:09.636116 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:09.636212 kubelet[1889]: E0517 00:37:09.636128 1889 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:09.642009 env[1373]: time="2025-05-17T00:37:09.641952634Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c53606cea03e59dcbfa981dc43a55dff05952895f72576b8389fa00be09ab676,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:09.647033 env[1373]: time="2025-05-17T00:37:09.647002746Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:09.651898 env[1373]: time="2025-05-17T00:37:09.651864158Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:ce76dd87f11d3fd0054c35ad2e0e9f833748d007f77a9bfe859d0ddcb66fcb2c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:09.652391 env[1373]: time="2025-05-17T00:37:09.652358659Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\" returns image reference \"sha256:c53606cea03e59dcbfa981dc43a55dff05952895f72576b8389fa00be09ab676\"" May 17 00:37:09.659989 env[1373]: time="2025-05-17T00:37:09.659952976Z" level=info msg="CreateContainer within sandbox \"eba4353afdbbbfceb6138ceece443f1e8f20f6bcac5f37ac619e46a8f849e2ab\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 17 00:37:09.689817 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1305978563.mount: Deactivated successfully. May 17 00:37:09.710933 env[1373]: time="2025-05-17T00:37:09.710880596Z" level=info msg="CreateContainer within sandbox \"eba4353afdbbbfceb6138ceece443f1e8f20f6bcac5f37ac619e46a8f849e2ab\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"9f9ca8081dc73dd2cf2208ec7468fc1abb93b56296f0a70af07f4ccbdd1c3acc\"" May 17 00:37:09.711612 env[1373]: time="2025-05-17T00:37:09.711577497Z" level=info msg="StartContainer for \"9f9ca8081dc73dd2cf2208ec7468fc1abb93b56296f0a70af07f4ccbdd1c3acc\"" May 17 00:37:09.728127 systemd[1]: Started cri-containerd-9f9ca8081dc73dd2cf2208ec7468fc1abb93b56296f0a70af07f4ccbdd1c3acc.scope. May 17 00:37:09.744000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:09.744000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=7f3df9213398 items=0 ppid=1985 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:09.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966396361383038316463373364643263663232303865633734363866 May 17 00:37:09.744000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:09.744000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:09.744000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:09.744000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:09.744000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:09.744000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:09.744000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:09.744000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:09.744000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:09.744000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:09.744000 audit: BPF prog-id=67 op=LOAD May 17 00:37:09.744000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c59d8 a2=78 a3=c000353ba8 items=0 ppid=1985 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:09.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966396361383038316463373364643263663232303865633734363866 May 17 00:37:09.745000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:09.745000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:09.745000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:09.745000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:09.745000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:09.745000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:09.745000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:09.745000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:09.745000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:09.745000 audit: BPF prog-id=68 op=LOAD May 17 00:37:09.745000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001c5770 a2=78 a3=c000353bf8 items=0 ppid=1985 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:09.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966396361383038316463373364643263663232303865633734363866 May 17 00:37:09.745000 audit: BPF prog-id=68 op=UNLOAD May 17 00:37:09.745000 audit: BPF prog-id=67 op=UNLOAD May 17 00:37:09.745000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:09.745000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:09.745000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:09.745000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:09.745000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:09.745000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:09.745000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:09.745000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:09.745000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:09.745000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:09.745000 audit: BPF prog-id=69 op=LOAD May 17 00:37:09.745000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c5c30 a2=78 a3=c000353c88 items=0 ppid=1985 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:09.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966396361383038316463373364643263663232303865633734363866 May 17 00:37:09.770724 systemd[1]: cri-containerd-9f9ca8081dc73dd2cf2208ec7468fc1abb93b56296f0a70af07f4ccbdd1c3acc.scope: Deactivated successfully. May 17 00:37:09.773083 env[1373]: time="2025-05-17T00:37:09.773039041Z" level=info msg="StartContainer for \"9f9ca8081dc73dd2cf2208ec7468fc1abb93b56296f0a70af07f4ccbdd1c3acc\" returns successfully" May 17 00:37:09.773000 audit: BPF prog-id=69 op=UNLOAD May 17 00:37:10.448164 kubelet[1889]: E0517 00:37:10.448107 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:10.504953 kubelet[1889]: E0517 00:37:10.504903 1889 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mjvqz" podUID="4c0874f4-3d52-4bc3-91d1-2863ef2820cc" May 17 00:37:10.590316 kubelet[1889]: I0517 00:37:10.590255 1889 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-gzgl4" podStartSLOduration=6.482600879 podStartE2EDuration="8.59023717s" podCreationTimestamp="2025-05-17 00:37:02 +0000 UTC" firstStartedPulling="2025-05-17 00:37:05.977231452 +0000 UTC m=+4.442288561" lastFinishedPulling="2025-05-17 00:37:08.084867743 +0000 UTC m=+6.549924852" observedRunningTime="2025-05-17 00:37:08.536404271 +0000 UTC m=+7.001461480" watchObservedRunningTime="2025-05-17 00:37:10.59023717 +0000 UTC m=+9.055294379" May 17 00:37:10.877597 env[1373]: time="2025-05-17T00:37:10.877538101Z" level=info msg="shim disconnected" id=9f9ca8081dc73dd2cf2208ec7468fc1abb93b56296f0a70af07f4ccbdd1c3acc May 17 00:37:10.877597 env[1373]: time="2025-05-17T00:37:10.877599301Z" level=warning msg="cleaning up after shim disconnected" id=9f9ca8081dc73dd2cf2208ec7468fc1abb93b56296f0a70af07f4ccbdd1c3acc namespace=k8s.io May 17 00:37:10.878185 env[1373]: time="2025-05-17T00:37:10.877613701Z" level=info msg="cleaning up dead shim" May 17 00:37:10.886007 env[1373]: time="2025-05-17T00:37:10.885959920Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:37:10Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2334 runtime=io.containerd.runc.v2\n" May 17 00:37:11.448344 kubelet[1889]: E0517 00:37:11.448286 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:11.532126 env[1373]: time="2025-05-17T00:37:11.532076666Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\"" May 17 00:37:12.449049 kubelet[1889]: E0517 00:37:12.448993 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:12.502805 kubelet[1889]: E0517 00:37:12.502740 1889 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mjvqz" podUID="4c0874f4-3d52-4bc3-91d1-2863ef2820cc" May 17 00:37:13.449471 kubelet[1889]: E0517 00:37:13.449428 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:14.449922 kubelet[1889]: E0517 00:37:14.449877 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:14.524344 kubelet[1889]: E0517 00:37:14.503004 1889 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mjvqz" podUID="4c0874f4-3d52-4bc3-91d1-2863ef2820cc" May 17 00:37:15.450857 kubelet[1889]: E0517 00:37:15.450784 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:16.021691 env[1373]: time="2025-05-17T00:37:16.021641120Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:16.033766 env[1373]: time="2025-05-17T00:37:16.033722664Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:15f996c472622f23047ea38b2d72940e8c34d0996b8a2e12a1f255c1d7083185,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:16.039579 env[1373]: time="2025-05-17T00:37:16.039541329Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:16.047976 env[1373]: time="2025-05-17T00:37:16.047941668Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:3dd06656abdc03fbd51782d5f6fe4d70e6825a1c0c5bce2a165bbd2ff9e0f7df,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:16.048984 env[1373]: time="2025-05-17T00:37:16.048499984Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\" returns image reference \"sha256:15f996c472622f23047ea38b2d72940e8c34d0996b8a2e12a1f255c1d7083185\"" May 17 00:37:16.058580 env[1373]: time="2025-05-17T00:37:16.058547770Z" level=info msg="CreateContainer within sandbox \"eba4353afdbbbfceb6138ceece443f1e8f20f6bcac5f37ac619e46a8f849e2ab\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 17 00:37:16.084067 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2711146047.mount: Deactivated successfully. May 17 00:37:16.103573 env[1373]: time="2025-05-17T00:37:16.103530849Z" level=info msg="CreateContainer within sandbox \"eba4353afdbbbfceb6138ceece443f1e8f20f6bcac5f37ac619e46a8f849e2ab\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"3d70890d8f50cd86866a422d743a548e90fc7aa86fac1ece6425ed80ea0dcc1d\"" May 17 00:37:16.104307 env[1373]: time="2025-05-17T00:37:16.104263570Z" level=info msg="StartContainer for \"3d70890d8f50cd86866a422d743a548e90fc7aa86fac1ece6425ed80ea0dcc1d\"" May 17 00:37:16.135682 systemd[1]: Started cri-containerd-3d70890d8f50cd86866a422d743a548e90fc7aa86fac1ece6425ed80ea0dcc1d.scope. May 17 00:37:16.149000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.166631 kernel: kauditd_printk_skb: 344 callbacks suppressed May 17 00:37:16.166820 kernel: audit: type=1400 audit(1747442236.149:519): avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.149000 audit[2354]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fa7fee920f8 items=0 ppid=1985 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:16.185575 kernel: audit: type=1300 audit(1747442236.149:519): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fa7fee920f8 items=0 ppid=1985 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:16.185737 kernel: audit: type=1327 audit(1747442236.149:519): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364373038393064386635306364383638363661343232643734336135 May 17 00:37:16.149000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364373038393064386635306364383638363661343232643734336135 May 17 00:37:16.150000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.216795 env[1373]: time="2025-05-17T00:37:16.216750870Z" level=info msg="StartContainer for \"3d70890d8f50cd86866a422d743a548e90fc7aa86fac1ece6425ed80ea0dcc1d\" returns successfully" May 17 00:37:16.232193 kernel: audit: type=1400 audit(1747442236.150:520): avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.232326 kernel: audit: type=1400 audit(1747442236.150:520): avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.150000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.150000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.259391 kernel: audit: type=1400 audit(1747442236.150:520): avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.259535 kernel: audit: type=1400 audit(1747442236.150:520): avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.150000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.272723 kernel: audit: type=1400 audit(1747442236.150:520): avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.150000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.286400 kernel: audit: type=1400 audit(1747442236.150:520): avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.150000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.299726 kernel: audit: type=1400 audit(1747442236.150:520): avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.150000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.150000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.150000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.150000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.150000 audit: BPF prog-id=70 op=LOAD May 17 00:37:16.150000 audit[2354]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003cc348 items=0 ppid=1985 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:16.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364373038393064386635306364383638363661343232643734336135 May 17 00:37:16.153000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.153000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.153000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.153000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.153000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.153000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.153000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.153000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.153000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.153000 audit: BPF prog-id=71 op=LOAD May 17 00:37:16.153000 audit[2354]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0003cc398 items=0 ppid=1985 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:16.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364373038393064386635306364383638363661343232643734336135 May 17 00:37:16.165000 audit: BPF prog-id=71 op=UNLOAD May 17 00:37:16.165000 audit: BPF prog-id=70 op=UNLOAD May 17 00:37:16.165000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.165000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.165000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.165000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.165000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.165000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.165000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.165000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.165000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.165000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.165000 audit: BPF prog-id=72 op=LOAD May 17 00:37:16.165000 audit[2354]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003cc428 items=0 ppid=1985 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:16.165000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364373038393064386635306364383638363661343232643734336135 May 17 00:37:16.451664 kubelet[1889]: E0517 00:37:16.451614 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:16.503185 kubelet[1889]: E0517 00:37:16.502643 1889 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mjvqz" podUID="4c0874f4-3d52-4bc3-91d1-2863ef2820cc" May 17 00:37:17.452518 kubelet[1889]: E0517 00:37:17.452449 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:17.964906 env[1373]: time="2025-05-17T00:37:17.964825437Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 17 00:37:17.966888 systemd[1]: cri-containerd-3d70890d8f50cd86866a422d743a548e90fc7aa86fac1ece6425ed80ea0dcc1d.scope: Deactivated successfully. May 17 00:37:17.969000 audit: BPF prog-id=72 op=UNLOAD May 17 00:37:17.985405 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-3d70890d8f50cd86866a422d743a548e90fc7aa86fac1ece6425ed80ea0dcc1d-rootfs.mount: Deactivated successfully. May 17 00:37:18.042177 kubelet[1889]: I0517 00:37:18.042122 1889 kubelet_node_status.go:501] "Fast updating node status as it just became ready" May 17 00:37:18.507993 systemd[1]: Created slice kubepods-besteffort-pod4c0874f4_3d52_4bc3_91d1_2863ef2820cc.slice. May 17 00:37:18.589906 env[1373]: time="2025-05-17T00:37:18.582406278Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-mjvqz,Uid:4c0874f4-3d52-4bc3-91d1-2863ef2820cc,Namespace:calico-system,Attempt:0,}" May 17 00:37:18.589992 kubelet[1889]: E0517 00:37:18.453013 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:19.334257 env[1373]: time="2025-05-17T00:37:19.334209459Z" level=info msg="shim disconnected" id=3d70890d8f50cd86866a422d743a548e90fc7aa86fac1ece6425ed80ea0dcc1d May 17 00:37:19.334641 env[1373]: time="2025-05-17T00:37:19.334608669Z" level=warning msg="cleaning up after shim disconnected" id=3d70890d8f50cd86866a422d743a548e90fc7aa86fac1ece6425ed80ea0dcc1d namespace=k8s.io May 17 00:37:19.334641 env[1373]: time="2025-05-17T00:37:19.334630970Z" level=info msg="cleaning up dead shim" May 17 00:37:19.343046 env[1373]: time="2025-05-17T00:37:19.342995989Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:37:19Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2394 runtime=io.containerd.runc.v2\n" May 17 00:37:19.415240 env[1373]: time="2025-05-17T00:37:19.415163777Z" level=error msg="Failed to destroy network for sandbox \"4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:19.418214 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271-shm.mount: Deactivated successfully. May 17 00:37:19.419405 env[1373]: time="2025-05-17T00:37:19.419304685Z" level=error msg="encountered an error cleaning up failed sandbox \"4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:19.419405 env[1373]: time="2025-05-17T00:37:19.419384288Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-mjvqz,Uid:4c0874f4-3d52-4bc3-91d1-2863ef2820cc,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:19.419713 kubelet[1889]: E0517 00:37:19.419675 1889 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:19.419803 kubelet[1889]: E0517 00:37:19.419748 1889 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-mjvqz" May 17 00:37:19.419803 kubelet[1889]: E0517 00:37:19.419783 1889 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-mjvqz" May 17 00:37:19.419896 kubelet[1889]: E0517 00:37:19.419854 1889 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-mjvqz_calico-system(4c0874f4-3d52-4bc3-91d1-2863ef2820cc)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-mjvqz_calico-system(4c0874f4-3d52-4bc3-91d1-2863ef2820cc)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-mjvqz" podUID="4c0874f4-3d52-4bc3-91d1-2863ef2820cc" May 17 00:37:19.453451 kubelet[1889]: E0517 00:37:19.453405 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:19.547866 env[1373]: time="2025-05-17T00:37:19.547817248Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\"" May 17 00:37:19.548455 kubelet[1889]: I0517 00:37:19.548422 1889 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271" May 17 00:37:19.549103 env[1373]: time="2025-05-17T00:37:19.549066481Z" level=info msg="StopPodSandbox for \"4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271\"" May 17 00:37:19.580483 env[1373]: time="2025-05-17T00:37:19.580425101Z" level=error msg="StopPodSandbox for \"4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271\" failed" error="failed to destroy network for sandbox \"4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:19.580829 kubelet[1889]: E0517 00:37:19.580781 1889 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271" May 17 00:37:19.580948 kubelet[1889]: E0517 00:37:19.580854 1889 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271"} May 17 00:37:19.580948 kubelet[1889]: E0517 00:37:19.580919 1889 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4c0874f4-3d52-4bc3-91d1-2863ef2820cc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:37:19.581060 kubelet[1889]: E0517 00:37:19.580949 1889 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4c0874f4-3d52-4bc3-91d1-2863ef2820cc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-mjvqz" podUID="4c0874f4-3d52-4bc3-91d1-2863ef2820cc" May 17 00:37:20.453862 kubelet[1889]: E0517 00:37:20.453792 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:21.454940 kubelet[1889]: E0517 00:37:21.454880 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:22.434897 kubelet[1889]: E0517 00:37:22.434835 1889 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:22.455363 kubelet[1889]: E0517 00:37:22.455296 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:23.456515 kubelet[1889]: E0517 00:37:23.456461 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:24.457576 kubelet[1889]: E0517 00:37:24.457532 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:24.641761 systemd[1]: Created slice kubepods-besteffort-pod4ba22c34_84c6_4a75_9e17_9038b998708b.slice. May 17 00:37:24.738445 kubelet[1889]: I0517 00:37:24.738381 1889 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-snvs2\" (UniqueName: \"kubernetes.io/projected/4ba22c34-84c6-4a75-9e17-9038b998708b-kube-api-access-snvs2\") pod \"nginx-deployment-7fcdb87857-zt87t\" (UID: \"4ba22c34-84c6-4a75-9e17-9038b998708b\") " pod="default/nginx-deployment-7fcdb87857-zt87t" May 17 00:37:24.946127 env[1373]: time="2025-05-17T00:37:24.945738621Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-zt87t,Uid:4ba22c34-84c6-4a75-9e17-9038b998708b,Namespace:default,Attempt:0,}" May 17 00:37:25.119206 env[1373]: time="2025-05-17T00:37:25.118759597Z" level=error msg="Failed to destroy network for sandbox \"b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:25.123480 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae-shm.mount: Deactivated successfully. May 17 00:37:25.125473 env[1373]: time="2025-05-17T00:37:25.125413444Z" level=error msg="encountered an error cleaning up failed sandbox \"b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:25.125590 env[1373]: time="2025-05-17T00:37:25.125500946Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-zt87t,Uid:4ba22c34-84c6-4a75-9e17-9038b998708b,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:25.125787 kubelet[1889]: E0517 00:37:25.125746 1889 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:25.125868 kubelet[1889]: E0517 00:37:25.125823 1889 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-zt87t" May 17 00:37:25.125868 kubelet[1889]: E0517 00:37:25.125853 1889 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-zt87t" May 17 00:37:25.125958 kubelet[1889]: E0517 00:37:25.125917 1889 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-7fcdb87857-zt87t_default(4ba22c34-84c6-4a75-9e17-9038b998708b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-7fcdb87857-zt87t_default(4ba22c34-84c6-4a75-9e17-9038b998708b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-zt87t" podUID="4ba22c34-84c6-4a75-9e17-9038b998708b" May 17 00:37:25.459258 kubelet[1889]: E0517 00:37:25.458482 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:25.568227 kubelet[1889]: I0517 00:37:25.567568 1889 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae" May 17 00:37:25.568617 env[1373]: time="2025-05-17T00:37:25.568581085Z" level=info msg="StopPodSandbox for \"b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae\"" May 17 00:37:25.619172 env[1373]: time="2025-05-17T00:37:25.619094107Z" level=error msg="StopPodSandbox for \"b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae\" failed" error="failed to destroy network for sandbox \"b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:25.619783 kubelet[1889]: E0517 00:37:25.619577 1889 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae" May 17 00:37:25.619783 kubelet[1889]: E0517 00:37:25.619630 1889 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae"} May 17 00:37:25.619783 kubelet[1889]: E0517 00:37:25.619675 1889 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4ba22c34-84c6-4a75-9e17-9038b998708b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:37:25.619783 kubelet[1889]: E0517 00:37:25.619722 1889 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4ba22c34-84c6-4a75-9e17-9038b998708b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-zt87t" podUID="4ba22c34-84c6-4a75-9e17-9038b998708b" May 17 00:37:26.459600 kubelet[1889]: E0517 00:37:26.459547 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:27.460204 kubelet[1889]: E0517 00:37:27.460127 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:28.219835 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1880793244.mount: Deactivated successfully. May 17 00:37:28.257265 env[1373]: time="2025-05-17T00:37:28.257207300Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:28.264912 env[1373]: time="2025-05-17T00:37:28.264863557Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d12dae9bc0999225efe30fd5618bcf2195709d54ed2840234f5006aab5f7d721,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:28.269001 env[1373]: time="2025-05-17T00:37:28.268961741Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:28.272973 env[1373]: time="2025-05-17T00:37:28.272936323Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:7cb61ea47ca0a8e6d0526a42da4f1e399b37ccd13339d0776d272465cb7ee012,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:28.273329 env[1373]: time="2025-05-17T00:37:28.273296830Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\" returns image reference \"sha256:d12dae9bc0999225efe30fd5618bcf2195709d54ed2840234f5006aab5f7d721\"" May 17 00:37:28.294367 env[1373]: time="2025-05-17T00:37:28.294326561Z" level=info msg="CreateContainer within sandbox \"eba4353afdbbbfceb6138ceece443f1e8f20f6bcac5f37ac619e46a8f849e2ab\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 17 00:37:28.321842 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount659232812.mount: Deactivated successfully. May 17 00:37:28.336532 env[1373]: time="2025-05-17T00:37:28.336477925Z" level=info msg="CreateContainer within sandbox \"eba4353afdbbbfceb6138ceece443f1e8f20f6bcac5f37ac619e46a8f849e2ab\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"ad1f1a87aed3892093ebab29462608afb151849960cd1bcf9d1f55eeb6e3e0f7\"" May 17 00:37:28.337277 env[1373]: time="2025-05-17T00:37:28.337190539Z" level=info msg="StartContainer for \"ad1f1a87aed3892093ebab29462608afb151849960cd1bcf9d1f55eeb6e3e0f7\"" May 17 00:37:28.354736 systemd[1]: Started cri-containerd-ad1f1a87aed3892093ebab29462608afb151849960cd1bcf9d1f55eeb6e3e0f7.scope. May 17 00:37:28.390106 kernel: kauditd_printk_skb: 34 callbacks suppressed May 17 00:37:28.390282 kernel: audit: type=1400 audit(1747442248.372:526): avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.372000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.372000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f3d60388ef8 items=0 ppid=1985 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:28.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164316631613837616564333839323039336562616232393436323630 May 17 00:37:28.426587 kernel: audit: type=1300 audit(1747442248.372:526): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f3d60388ef8 items=0 ppid=1985 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:28.426712 kernel: audit: type=1327 audit(1747442248.372:526): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164316631613837616564333839323039336562616232393436323630 May 17 00:37:28.426741 kernel: audit: type=1400 audit(1747442248.372:527): avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.372000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.439370 kernel: audit: type=1400 audit(1747442248.372:527): avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.372000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.372000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.463480 kernel: audit: type=1400 audit(1747442248.372:527): avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.463684 kubelet[1889]: E0517 00:37:28.463639 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:28.372000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.479300 kernel: audit: type=1400 audit(1747442248.372:527): avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.372000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.510279 kernel: audit: type=1400 audit(1747442248.372:527): avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.510427 kernel: audit: type=1400 audit(1747442248.372:527): avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.372000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.372000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.515281 env[1373]: time="2025-05-17T00:37:28.515241788Z" level=info msg="StartContainer for \"ad1f1a87aed3892093ebab29462608afb151849960cd1bcf9d1f55eeb6e3e0f7\" returns successfully" May 17 00:37:28.523414 kernel: audit: type=1400 audit(1747442248.372:527): avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.372000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.372000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.372000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.372000 audit: BPF prog-id=73 op=LOAD May 17 00:37:28.372000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00038c208 items=0 ppid=1985 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:28.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164316631613837616564333839323039336562616232393436323630 May 17 00:37:28.408000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.408000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.408000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.408000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.408000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.408000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.408000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.408000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.408000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.408000 audit: BPF prog-id=74 op=LOAD May 17 00:37:28.408000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00038c258 items=0 ppid=1985 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:28.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164316631613837616564333839323039336562616232393436323630 May 17 00:37:28.408000 audit: BPF prog-id=74 op=UNLOAD May 17 00:37:28.408000 audit: BPF prog-id=73 op=UNLOAD May 17 00:37:28.408000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.408000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.408000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.408000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.408000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.408000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.408000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.408000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.408000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.408000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:28.408000 audit: BPF prog-id=75 op=LOAD May 17 00:37:28.408000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00038c2e8 items=0 ppid=1985 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:28.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164316631613837616564333839323039336562616232393436323630 May 17 00:37:28.591943 kubelet[1889]: I0517 00:37:28.591877 1889 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-r4pqn" podStartSLOduration=4.31424352 podStartE2EDuration="26.591855558s" podCreationTimestamp="2025-05-17 00:37:02 +0000 UTC" firstStartedPulling="2025-05-17 00:37:05.996595511 +0000 UTC m=+4.461652620" lastFinishedPulling="2025-05-17 00:37:28.274207549 +0000 UTC m=+26.739264658" observedRunningTime="2025-05-17 00:37:28.591773357 +0000 UTC m=+27.056830466" watchObservedRunningTime="2025-05-17 00:37:28.591855558 +0000 UTC m=+27.056912767" May 17 00:37:28.762536 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 17 00:37:28.762713 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 17 00:37:29.464574 kubelet[1889]: E0517 00:37:29.464510 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:30.028000 audit[2634]: AVC avc: denied { write } for pid=2634 comm="tee" name="fd" dev="proc" ino=23403 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:37:30.028000 audit[2634]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffff12957dc a2=241 a3=1b6 items=1 ppid=2610 pid=2634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.028000 audit: CWD cwd="/etc/service/enabled/confd/log" May 17 00:37:30.028000 audit: PATH item=0 name="/dev/fd/63" inode=23651 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:30.028000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:37:30.037000 audit[2639]: AVC avc: denied { write } for pid=2639 comm="tee" name="fd" dev="proc" ino=23413 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:37:30.037000 audit[2639]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff9739f7cc a2=241 a3=1b6 items=1 ppid=2615 pid=2639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.037000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 17 00:37:30.037000 audit: PATH item=0 name="/dev/fd/63" inode=23400 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:30.037000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:37:30.040000 audit[2642]: AVC avc: denied { write } for pid=2642 comm="tee" name="fd" dev="proc" ino=23417 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:37:30.043000 audit[2650]: AVC avc: denied { write } for pid=2650 comm="tee" name="fd" dev="proc" ino=23420 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:37:30.043000 audit[2649]: AVC avc: denied { write } for pid=2649 comm="tee" name="fd" dev="proc" ino=23423 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:37:30.040000 audit[2642]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc40aee7dd a2=241 a3=1b6 items=1 ppid=2607 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.040000 audit: CWD cwd="/etc/service/enabled/bird/log" May 17 00:37:30.040000 audit: PATH item=0 name="/dev/fd/63" inode=23405 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:30.040000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:37:30.043000 audit[2650]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff80b5c7cd a2=241 a3=1b6 items=1 ppid=2614 pid=2650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.043000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 17 00:37:30.043000 audit: PATH item=0 name="/dev/fd/63" inode=23410 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:30.043000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:37:30.043000 audit[2649]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffed4b397de a2=241 a3=1b6 items=1 ppid=2606 pid=2649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.043000 audit: CWD cwd="/etc/service/enabled/cni/log" May 17 00:37:30.043000 audit: PATH item=0 name="/dev/fd/63" inode=23665 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:30.043000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:37:30.047000 audit[2646]: AVC avc: denied { write } for pid=2646 comm="tee" name="fd" dev="proc" ino=23671 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:37:30.047000 audit[2646]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffda19e47dc a2=241 a3=1b6 items=1 ppid=2618 pid=2646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.047000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 17 00:37:30.047000 audit: PATH item=0 name="/dev/fd/63" inode=23662 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:30.047000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:37:30.052000 audit[2664]: AVC avc: denied { write } for pid=2664 comm="tee" name="fd" dev="proc" ino=23431 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:37:30.052000 audit[2664]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe9968e7dc a2=241 a3=1b6 items=1 ppid=2625 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.052000 audit: CWD cwd="/etc/service/enabled/felix/log" May 17 00:37:30.052000 audit: PATH item=0 name="/dev/fd/63" inode=23668 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:30.052000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:37:30.331000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.331000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.331000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.331000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.331000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.331000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.331000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.331000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.331000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.331000 audit: BPF prog-id=76 op=LOAD May 17 00:37:30.331000 audit[2715]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc5b8b5660 a2=98 a3=3 items=0 ppid=2626 pid=2715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.331000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:30.332000 audit: BPF prog-id=76 op=UNLOAD May 17 00:37:30.332000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.332000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.332000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.332000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.332000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.332000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.332000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.332000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.332000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.332000 audit: BPF prog-id=77 op=LOAD May 17 00:37:30.332000 audit[2715]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc5b8b5450 a2=94 a3=54428f items=0 ppid=2626 pid=2715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.332000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:30.332000 audit: BPF prog-id=77 op=UNLOAD May 17 00:37:30.332000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.332000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.332000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.332000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.332000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.332000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.332000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.332000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.332000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.332000 audit: BPF prog-id=78 op=LOAD May 17 00:37:30.332000 audit[2715]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc5b8b5480 a2=94 a3=2 items=0 ppid=2626 pid=2715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.332000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:30.332000 audit: BPF prog-id=78 op=UNLOAD May 17 00:37:30.457000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.457000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.457000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.457000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.457000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.457000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.457000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.457000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.457000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.457000 audit: BPF prog-id=79 op=LOAD May 17 00:37:30.457000 audit[2715]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc5b8b5340 a2=94 a3=1 items=0 ppid=2626 pid=2715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.457000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:30.457000 audit: BPF prog-id=79 op=UNLOAD May 17 00:37:30.457000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.457000 audit[2715]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc5b8b5410 a2=50 a3=7ffc5b8b54f0 items=0 ppid=2626 pid=2715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.457000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:30.465411 kubelet[1889]: E0517 00:37:30.465340 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:30.467000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.467000 audit[2715]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc5b8b5350 a2=28 a3=0 items=0 ppid=2626 pid=2715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.467000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:30.467000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.467000 audit[2715]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc5b8b5380 a2=28 a3=0 items=0 ppid=2626 pid=2715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.467000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:30.467000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.467000 audit[2715]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc5b8b5290 a2=28 a3=0 items=0 ppid=2626 pid=2715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.467000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:30.467000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.467000 audit[2715]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc5b8b53a0 a2=28 a3=0 items=0 ppid=2626 pid=2715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.467000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:30.467000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.467000 audit[2715]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc5b8b5380 a2=28 a3=0 items=0 ppid=2626 pid=2715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.467000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:30.467000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.467000 audit[2715]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc5b8b5370 a2=28 a3=0 items=0 ppid=2626 pid=2715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.467000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:30.467000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.467000 audit[2715]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc5b8b53a0 a2=28 a3=0 items=0 ppid=2626 pid=2715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.467000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:30.467000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.467000 audit[2715]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc5b8b5380 a2=28 a3=0 items=0 ppid=2626 pid=2715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.467000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:30.467000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.467000 audit[2715]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc5b8b53a0 a2=28 a3=0 items=0 ppid=2626 pid=2715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.467000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:30.467000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.467000 audit[2715]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc5b8b5370 a2=28 a3=0 items=0 ppid=2626 pid=2715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.467000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:30.467000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.467000 audit[2715]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc5b8b53e0 a2=28 a3=0 items=0 ppid=2626 pid=2715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.467000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:30.467000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.467000 audit[2715]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc5b8b5190 a2=50 a3=1 items=0 ppid=2626 pid=2715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.467000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:30.467000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.467000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.467000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.467000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.467000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.467000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.467000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.467000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.467000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.467000 audit: BPF prog-id=80 op=LOAD May 17 00:37:30.467000 audit[2715]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc5b8b5190 a2=94 a3=5 items=0 ppid=2626 pid=2715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.467000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:30.468000 audit: BPF prog-id=80 op=UNLOAD May 17 00:37:30.468000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.468000 audit[2715]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc5b8b5240 a2=50 a3=1 items=0 ppid=2626 pid=2715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.468000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:30.468000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.468000 audit[2715]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc5b8b5360 a2=4 a3=38 items=0 ppid=2626 pid=2715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.468000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:30.468000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.468000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.468000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.468000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.468000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.468000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.468000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.468000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.468000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.468000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.468000 audit[2715]: AVC avc: denied { confidentiality } for pid=2715 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:30.468000 audit[2715]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc5b8b53b0 a2=94 a3=6 items=0 ppid=2626 pid=2715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.468000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:30.468000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.468000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.468000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.468000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.468000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.468000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.468000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.468000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.468000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.468000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.468000 audit[2715]: AVC avc: denied { confidentiality } for pid=2715 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:30.468000 audit[2715]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc5b8b4b60 a2=94 a3=88 items=0 ppid=2626 pid=2715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.468000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:30.468000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.468000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.468000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.468000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.468000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.468000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.468000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.468000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.468000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.468000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.468000 audit[2715]: AVC avc: denied { confidentiality } for pid=2715 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:30.468000 audit[2715]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc5b8b4b60 a2=94 a3=88 items=0 ppid=2626 pid=2715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.468000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:30.477000 audit[2718]: AVC avc: denied { bpf } for pid=2718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.477000 audit[2718]: AVC avc: denied { bpf } for pid=2718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.477000 audit[2718]: AVC avc: denied { perfmon } for pid=2718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.477000 audit[2718]: AVC avc: denied { perfmon } for pid=2718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.477000 audit[2718]: AVC avc: denied { perfmon } for pid=2718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.477000 audit[2718]: AVC avc: denied { perfmon } for pid=2718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.477000 audit[2718]: AVC avc: denied { perfmon } for pid=2718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.477000 audit[2718]: AVC avc: denied { bpf } for pid=2718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.477000 audit[2718]: AVC avc: denied { bpf } for pid=2718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.477000 audit: BPF prog-id=81 op=LOAD May 17 00:37:30.477000 audit[2718]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcd5feffc0 a2=98 a3=1999999999999999 items=0 ppid=2626 pid=2718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.477000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:37:30.477000 audit: BPF prog-id=81 op=UNLOAD May 17 00:37:30.477000 audit[2718]: AVC avc: denied { bpf } for pid=2718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.477000 audit[2718]: AVC avc: denied { bpf } for pid=2718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.477000 audit[2718]: AVC avc: denied { perfmon } for pid=2718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.477000 audit[2718]: AVC avc: denied { perfmon } for pid=2718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.477000 audit[2718]: AVC avc: denied { perfmon } for pid=2718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.477000 audit[2718]: AVC avc: denied { perfmon } for pid=2718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.477000 audit[2718]: AVC avc: denied { perfmon } for pid=2718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.477000 audit[2718]: AVC avc: denied { bpf } for pid=2718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.477000 audit[2718]: AVC avc: denied { bpf } for pid=2718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.477000 audit: BPF prog-id=82 op=LOAD May 17 00:37:30.477000 audit[2718]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcd5fefea0 a2=94 a3=ffff items=0 ppid=2626 pid=2718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.477000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:37:30.477000 audit: BPF prog-id=82 op=UNLOAD May 17 00:37:30.477000 audit[2718]: AVC avc: denied { bpf } for pid=2718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.477000 audit[2718]: AVC avc: denied { bpf } for pid=2718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.477000 audit[2718]: AVC avc: denied { perfmon } for pid=2718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.477000 audit[2718]: AVC avc: denied { perfmon } for pid=2718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.477000 audit[2718]: AVC avc: denied { perfmon } for pid=2718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.477000 audit[2718]: AVC avc: denied { perfmon } for pid=2718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.477000 audit[2718]: AVC avc: denied { perfmon } for pid=2718 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.477000 audit[2718]: AVC avc: denied { bpf } for pid=2718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.477000 audit[2718]: AVC avc: denied { bpf } for pid=2718 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.477000 audit: BPF prog-id=83 op=LOAD May 17 00:37:30.477000 audit[2718]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcd5fefee0 a2=94 a3=7ffcd5ff00c0 items=0 ppid=2626 pid=2718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.477000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:37:30.478000 audit: BPF prog-id=83 op=UNLOAD May 17 00:37:30.551560 systemd-networkd[1526]: vxlan.calico: Link UP May 17 00:37:30.551569 systemd-networkd[1526]: vxlan.calico: Gained carrier May 17 00:37:30.579000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.579000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.579000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.579000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.579000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.579000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.579000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.579000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.579000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.579000 audit: BPF prog-id=84 op=LOAD May 17 00:37:30.579000 audit[2746]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffedb2edb60 a2=98 a3=0 items=0 ppid=2626 pid=2746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.579000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:30.579000 audit: BPF prog-id=84 op=UNLOAD May 17 00:37:30.579000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.579000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.579000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.579000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.579000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.579000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.579000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.579000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.579000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.579000 audit: BPF prog-id=85 op=LOAD May 17 00:37:30.579000 audit[2746]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffedb2ed970 a2=94 a3=54428f items=0 ppid=2626 pid=2746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.579000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:30.579000 audit: BPF prog-id=85 op=UNLOAD May 17 00:37:30.579000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.579000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.579000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.579000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.579000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.579000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.579000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.579000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.579000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.579000 audit: BPF prog-id=86 op=LOAD May 17 00:37:30.579000 audit[2746]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffedb2ed9a0 a2=94 a3=2 items=0 ppid=2626 pid=2746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.579000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:30.579000 audit: BPF prog-id=86 op=UNLOAD May 17 00:37:30.579000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.579000 audit[2746]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffedb2ed870 a2=28 a3=0 items=0 ppid=2626 pid=2746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.579000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:30.579000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.579000 audit[2746]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffedb2ed8a0 a2=28 a3=0 items=0 ppid=2626 pid=2746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.579000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:30.579000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.579000 audit[2746]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffedb2ed7b0 a2=28 a3=0 items=0 ppid=2626 pid=2746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.579000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:30.579000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.579000 audit[2746]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffedb2ed8c0 a2=28 a3=0 items=0 ppid=2626 pid=2746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.579000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:30.579000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.579000 audit[2746]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffedb2ed8a0 a2=28 a3=0 items=0 ppid=2626 pid=2746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.579000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:30.579000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.579000 audit[2746]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffedb2ed890 a2=28 a3=0 items=0 ppid=2626 pid=2746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.579000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:30.579000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.579000 audit[2746]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffedb2ed8c0 a2=28 a3=0 items=0 ppid=2626 pid=2746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.579000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:30.579000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.579000 audit[2746]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffedb2ed8a0 a2=28 a3=0 items=0 ppid=2626 pid=2746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.579000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:30.579000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.579000 audit[2746]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffedb2ed8c0 a2=28 a3=0 items=0 ppid=2626 pid=2746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.579000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:30.580000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.580000 audit[2746]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffedb2ed890 a2=28 a3=0 items=0 ppid=2626 pid=2746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.580000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:30.580000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.580000 audit[2746]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffedb2ed900 a2=28 a3=0 items=0 ppid=2626 pid=2746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.580000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:30.580000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.580000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.580000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.580000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.580000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.580000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.580000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.580000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.580000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.580000 audit: BPF prog-id=87 op=LOAD May 17 00:37:30.580000 audit[2746]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffedb2ed770 a2=94 a3=0 items=0 ppid=2626 pid=2746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.580000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:30.580000 audit: BPF prog-id=87 op=UNLOAD May 17 00:37:30.580000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.580000 audit[2746]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffedb2ed760 a2=50 a3=2800 items=0 ppid=2626 pid=2746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.580000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:30.580000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.580000 audit[2746]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffedb2ed760 a2=50 a3=2800 items=0 ppid=2626 pid=2746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.580000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:30.580000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.580000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.580000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.580000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.580000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.580000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.580000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.580000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.580000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.580000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.580000 audit: BPF prog-id=88 op=LOAD May 17 00:37:30.580000 audit[2746]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffedb2ecf80 a2=94 a3=2 items=0 ppid=2626 pid=2746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.580000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:30.581000 audit: BPF prog-id=88 op=UNLOAD May 17 00:37:30.581000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.581000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.581000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.581000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.581000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.581000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.581000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.581000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.581000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.581000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.581000 audit: BPF prog-id=89 op=LOAD May 17 00:37:30.581000 audit[2746]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffedb2ed080 a2=94 a3=30 items=0 ppid=2626 pid=2746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.581000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:30.591000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.591000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.591000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.591000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.591000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.591000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.591000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.591000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.591000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.591000 audit: BPF prog-id=90 op=LOAD May 17 00:37:30.591000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcce031e20 a2=98 a3=0 items=0 ppid=2626 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.591000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:30.591000 audit: BPF prog-id=90 op=UNLOAD May 17 00:37:30.591000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.591000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.591000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.591000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.591000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.591000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.591000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.591000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.591000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.591000 audit: BPF prog-id=91 op=LOAD May 17 00:37:30.591000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcce031c10 a2=94 a3=54428f items=0 ppid=2626 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.591000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:30.592000 audit: BPF prog-id=91 op=UNLOAD May 17 00:37:30.592000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.592000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.592000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.592000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.592000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.592000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.592000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.592000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.592000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.592000 audit: BPF prog-id=92 op=LOAD May 17 00:37:30.592000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcce031c40 a2=94 a3=2 items=0 ppid=2626 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.592000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:30.592000 audit: BPF prog-id=92 op=UNLOAD May 17 00:37:30.730000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.730000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.730000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.730000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.730000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.730000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.730000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.730000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.730000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.730000 audit: BPF prog-id=93 op=LOAD May 17 00:37:30.730000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcce031b00 a2=94 a3=1 items=0 ppid=2626 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.730000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:30.730000 audit: BPF prog-id=93 op=UNLOAD May 17 00:37:30.730000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.730000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffcce031bd0 a2=50 a3=7ffcce031cb0 items=0 ppid=2626 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.730000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:30.740000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.740000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcce031b10 a2=28 a3=0 items=0 ppid=2626 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.740000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:30.740000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.740000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcce031b40 a2=28 a3=0 items=0 ppid=2626 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.740000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:30.740000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.740000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcce031a50 a2=28 a3=0 items=0 ppid=2626 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.740000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:30.740000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.740000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcce031b60 a2=28 a3=0 items=0 ppid=2626 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.740000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:30.740000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.740000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcce031b40 a2=28 a3=0 items=0 ppid=2626 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.740000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:30.740000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.740000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcce031b30 a2=28 a3=0 items=0 ppid=2626 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.740000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:30.740000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.740000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcce031b60 a2=28 a3=0 items=0 ppid=2626 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.740000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:30.740000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.740000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcce031b40 a2=28 a3=0 items=0 ppid=2626 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.740000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:30.740000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.740000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcce031b60 a2=28 a3=0 items=0 ppid=2626 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.740000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:30.740000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.740000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcce031b30 a2=28 a3=0 items=0 ppid=2626 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.740000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:30.740000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.740000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcce031ba0 a2=28 a3=0 items=0 ppid=2626 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.740000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:30.740000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.740000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcce031950 a2=50 a3=1 items=0 ppid=2626 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.740000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:30.740000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.740000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.740000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.740000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.740000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.740000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.740000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.740000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.740000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.740000 audit: BPF prog-id=94 op=LOAD May 17 00:37:30.740000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcce031950 a2=94 a3=5 items=0 ppid=2626 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.740000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:30.741000 audit: BPF prog-id=94 op=UNLOAD May 17 00:37:30.741000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.741000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcce031a00 a2=50 a3=1 items=0 ppid=2626 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.741000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:30.741000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.741000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffcce031b20 a2=4 a3=38 items=0 ppid=2626 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.741000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:30.741000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.741000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.741000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.741000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.741000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.741000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.741000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.741000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.741000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.741000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.741000 audit[2748]: AVC avc: denied { confidentiality } for pid=2748 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:30.741000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcce031b70 a2=94 a3=6 items=0 ppid=2626 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.741000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:30.741000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.741000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.741000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.741000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.741000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.741000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.741000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.741000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.741000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.741000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.741000 audit[2748]: AVC avc: denied { confidentiality } for pid=2748 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:30.741000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcce031320 a2=94 a3=88 items=0 ppid=2626 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.741000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:30.741000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.741000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.741000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.741000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.741000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.741000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.741000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.741000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.741000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcce031320 a2=94 a3=88 items=0 ppid=2626 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.741000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:30.742000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.742000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcce032d50 a2=10 a3=f8f00800 items=0 ppid=2626 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.742000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:30.742000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.742000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcce032bf0 a2=10 a3=3 items=0 ppid=2626 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.742000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:30.742000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.742000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcce032b90 a2=10 a3=3 items=0 ppid=2626 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.742000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:30.742000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.742000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcce032b90 a2=10 a3=7 items=0 ppid=2626 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.742000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:30.749000 audit: BPF prog-id=89 op=UNLOAD May 17 00:37:30.828000 audit[2773]: NETFILTER_CFG table=mangle:72 family=2 entries=16 op=nft_register_chain pid=2773 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:37:30.828000 audit[2773]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffcdbd384b0 a2=0 a3=7ffcdbd3849c items=0 ppid=2626 pid=2773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.828000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:37:30.844000 audit[2772]: NETFILTER_CFG table=filter:73 family=2 entries=39 op=nft_register_chain pid=2772 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:37:30.844000 audit[2772]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffe3d6922f0 a2=0 a3=7ffe3d6922dc items=0 ppid=2626 pid=2772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.844000 audit[2775]: NETFILTER_CFG table=nat:74 family=2 entries=15 op=nft_register_chain pid=2775 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:37:30.844000 audit[2775]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffeec90f080 a2=0 a3=55ac5adc3000 items=0 ppid=2626 pid=2775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.844000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:37:30.844000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:37:30.851000 audit[2771]: NETFILTER_CFG table=raw:75 family=2 entries=21 op=nft_register_chain pid=2771 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:37:30.851000 audit[2771]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffd573a7520 a2=0 a3=7ffd573a750c items=0 ppid=2626 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.851000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:37:31.465783 kubelet[1889]: E0517 00:37:31.465727 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:32.466251 kubelet[1889]: E0517 00:37:32.466192 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:32.604358 systemd-networkd[1526]: vxlan.calico: Gained IPv6LL May 17 00:37:33.467174 kubelet[1889]: E0517 00:37:33.467111 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:34.467343 kubelet[1889]: E0517 00:37:34.467276 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:34.503797 env[1373]: time="2025-05-17T00:37:34.503740404Z" level=info msg="StopPodSandbox for \"4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271\"" May 17 00:37:34.584867 env[1373]: 2025-05-17 00:37:34.554 [INFO][2796] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271" May 17 00:37:34.584867 env[1373]: 2025-05-17 00:37:34.554 [INFO][2796] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271" iface="eth0" netns="/var/run/netns/cni-b028e276-8bbd-8ba6-2cf5-62cd46059774" May 17 00:37:34.584867 env[1373]: 2025-05-17 00:37:34.554 [INFO][2796] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271" iface="eth0" netns="/var/run/netns/cni-b028e276-8bbd-8ba6-2cf5-62cd46059774" May 17 00:37:34.584867 env[1373]: 2025-05-17 00:37:34.554 [INFO][2796] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271" iface="eth0" netns="/var/run/netns/cni-b028e276-8bbd-8ba6-2cf5-62cd46059774" May 17 00:37:34.584867 env[1373]: 2025-05-17 00:37:34.554 [INFO][2796] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271" May 17 00:37:34.584867 env[1373]: 2025-05-17 00:37:34.554 [INFO][2796] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271" May 17 00:37:34.584867 env[1373]: 2025-05-17 00:37:34.573 [INFO][2803] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271" HandleID="k8s-pod-network.4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271" Workload="10.200.4.22-k8s-csi--node--driver--mjvqz-eth0" May 17 00:37:34.584867 env[1373]: 2025-05-17 00:37:34.574 [INFO][2803] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:34.584867 env[1373]: 2025-05-17 00:37:34.574 [INFO][2803] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:34.584867 env[1373]: 2025-05-17 00:37:34.580 [WARNING][2803] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271" HandleID="k8s-pod-network.4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271" Workload="10.200.4.22-k8s-csi--node--driver--mjvqz-eth0" May 17 00:37:34.584867 env[1373]: 2025-05-17 00:37:34.580 [INFO][2803] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271" HandleID="k8s-pod-network.4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271" Workload="10.200.4.22-k8s-csi--node--driver--mjvqz-eth0" May 17 00:37:34.584867 env[1373]: 2025-05-17 00:37:34.581 [INFO][2803] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:34.584867 env[1373]: 2025-05-17 00:37:34.583 [INFO][2796] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271" May 17 00:37:34.589301 env[1373]: time="2025-05-17T00:37:34.587476371Z" level=info msg="TearDown network for sandbox \"4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271\" successfully" May 17 00:37:34.589301 env[1373]: time="2025-05-17T00:37:34.587520771Z" level=info msg="StopPodSandbox for \"4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271\" returns successfully" May 17 00:37:34.589301 env[1373]: time="2025-05-17T00:37:34.588393687Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-mjvqz,Uid:4c0874f4-3d52-4bc3-91d1-2863ef2820cc,Namespace:calico-system,Attempt:1,}" May 17 00:37:34.587454 systemd[1]: run-netns-cni\x2db028e276\x2d8bbd\x2d8ba6\x2d2cf5\x2d62cd46059774.mount: Deactivated successfully. May 17 00:37:34.732722 systemd-networkd[1526]: cali17c591de095: Link UP May 17 00:37:34.742500 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:37:34.742596 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali17c591de095: link becomes ready May 17 00:37:34.743015 systemd-networkd[1526]: cali17c591de095: Gained carrier May 17 00:37:34.757913 env[1373]: 2025-05-17 00:37:34.668 [INFO][2809] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.4.22-k8s-csi--node--driver--mjvqz-eth0 csi-node-driver- calico-system 4c0874f4-3d52-4bc3-91d1-2863ef2820cc 1443 0 2025-05-17 00:37:02 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:78f6f74485 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.200.4.22 csi-node-driver-mjvqz eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali17c591de095 [] [] }} ContainerID="aa4676902eb769ce36711c10eaa99cd862190e57199ef5ffd404b30133605c7c" Namespace="calico-system" Pod="csi-node-driver-mjvqz" WorkloadEndpoint="10.200.4.22-k8s-csi--node--driver--mjvqz-" May 17 00:37:34.757913 env[1373]: 2025-05-17 00:37:34.668 [INFO][2809] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="aa4676902eb769ce36711c10eaa99cd862190e57199ef5ffd404b30133605c7c" Namespace="calico-system" Pod="csi-node-driver-mjvqz" WorkloadEndpoint="10.200.4.22-k8s-csi--node--driver--mjvqz-eth0" May 17 00:37:34.757913 env[1373]: 2025-05-17 00:37:34.692 [INFO][2822] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="aa4676902eb769ce36711c10eaa99cd862190e57199ef5ffd404b30133605c7c" HandleID="k8s-pod-network.aa4676902eb769ce36711c10eaa99cd862190e57199ef5ffd404b30133605c7c" Workload="10.200.4.22-k8s-csi--node--driver--mjvqz-eth0" May 17 00:37:34.757913 env[1373]: 2025-05-17 00:37:34.693 [INFO][2822] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="aa4676902eb769ce36711c10eaa99cd862190e57199ef5ffd404b30133605c7c" HandleID="k8s-pod-network.aa4676902eb769ce36711c10eaa99cd862190e57199ef5ffd404b30133605c7c" Workload="10.200.4.22-k8s-csi--node--driver--mjvqz-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00004e4f0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.200.4.22", "pod":"csi-node-driver-mjvqz", "timestamp":"2025-05-17 00:37:34.692963319 +0000 UTC"}, Hostname:"10.200.4.22", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:37:34.757913 env[1373]: 2025-05-17 00:37:34.693 [INFO][2822] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:34.757913 env[1373]: 2025-05-17 00:37:34.693 [INFO][2822] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:34.757913 env[1373]: 2025-05-17 00:37:34.693 [INFO][2822] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.4.22' May 17 00:37:34.757913 env[1373]: 2025-05-17 00:37:34.701 [INFO][2822] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.aa4676902eb769ce36711c10eaa99cd862190e57199ef5ffd404b30133605c7c" host="10.200.4.22" May 17 00:37:34.757913 env[1373]: 2025-05-17 00:37:34.705 [INFO][2822] ipam/ipam.go 394: Looking up existing affinities for host host="10.200.4.22" May 17 00:37:34.757913 env[1373]: 2025-05-17 00:37:34.709 [INFO][2822] ipam/ipam.go 511: Trying affinity for 192.168.35.128/26 host="10.200.4.22" May 17 00:37:34.757913 env[1373]: 2025-05-17 00:37:34.710 [INFO][2822] ipam/ipam.go 158: Attempting to load block cidr=192.168.35.128/26 host="10.200.4.22" May 17 00:37:34.757913 env[1373]: 2025-05-17 00:37:34.712 [INFO][2822] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.35.128/26 host="10.200.4.22" May 17 00:37:34.757913 env[1373]: 2025-05-17 00:37:34.712 [INFO][2822] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.35.128/26 handle="k8s-pod-network.aa4676902eb769ce36711c10eaa99cd862190e57199ef5ffd404b30133605c7c" host="10.200.4.22" May 17 00:37:34.757913 env[1373]: 2025-05-17 00:37:34.713 [INFO][2822] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.aa4676902eb769ce36711c10eaa99cd862190e57199ef5ffd404b30133605c7c May 17 00:37:34.757913 env[1373]: 2025-05-17 00:37:34.718 [INFO][2822] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.35.128/26 handle="k8s-pod-network.aa4676902eb769ce36711c10eaa99cd862190e57199ef5ffd404b30133605c7c" host="10.200.4.22" May 17 00:37:34.757913 env[1373]: 2025-05-17 00:37:34.725 [INFO][2822] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.35.129/26] block=192.168.35.128/26 handle="k8s-pod-network.aa4676902eb769ce36711c10eaa99cd862190e57199ef5ffd404b30133605c7c" host="10.200.4.22" May 17 00:37:34.757913 env[1373]: 2025-05-17 00:37:34.725 [INFO][2822] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.35.129/26] handle="k8s-pod-network.aa4676902eb769ce36711c10eaa99cd862190e57199ef5ffd404b30133605c7c" host="10.200.4.22" May 17 00:37:34.757913 env[1373]: 2025-05-17 00:37:34.725 [INFO][2822] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:34.757913 env[1373]: 2025-05-17 00:37:34.725 [INFO][2822] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.35.129/26] IPv6=[] ContainerID="aa4676902eb769ce36711c10eaa99cd862190e57199ef5ffd404b30133605c7c" HandleID="k8s-pod-network.aa4676902eb769ce36711c10eaa99cd862190e57199ef5ffd404b30133605c7c" Workload="10.200.4.22-k8s-csi--node--driver--mjvqz-eth0" May 17 00:37:34.761665 env[1373]: 2025-05-17 00:37:34.727 [INFO][2809] cni-plugin/k8s.go 418: Populated endpoint ContainerID="aa4676902eb769ce36711c10eaa99cd862190e57199ef5ffd404b30133605c7c" Namespace="calico-system" Pod="csi-node-driver-mjvqz" WorkloadEndpoint="10.200.4.22-k8s-csi--node--driver--mjvqz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.22-k8s-csi--node--driver--mjvqz-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4c0874f4-3d52-4bc3-91d1-2863ef2820cc", ResourceVersion:"1443", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.22", ContainerID:"", Pod:"csi-node-driver-mjvqz", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.35.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali17c591de095", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:37:34.761665 env[1373]: 2025-05-17 00:37:34.727 [INFO][2809] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.35.129/32] ContainerID="aa4676902eb769ce36711c10eaa99cd862190e57199ef5ffd404b30133605c7c" Namespace="calico-system" Pod="csi-node-driver-mjvqz" WorkloadEndpoint="10.200.4.22-k8s-csi--node--driver--mjvqz-eth0" May 17 00:37:34.761665 env[1373]: 2025-05-17 00:37:34.727 [INFO][2809] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali17c591de095 ContainerID="aa4676902eb769ce36711c10eaa99cd862190e57199ef5ffd404b30133605c7c" Namespace="calico-system" Pod="csi-node-driver-mjvqz" WorkloadEndpoint="10.200.4.22-k8s-csi--node--driver--mjvqz-eth0" May 17 00:37:34.761665 env[1373]: 2025-05-17 00:37:34.744 [INFO][2809] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="aa4676902eb769ce36711c10eaa99cd862190e57199ef5ffd404b30133605c7c" Namespace="calico-system" Pod="csi-node-driver-mjvqz" WorkloadEndpoint="10.200.4.22-k8s-csi--node--driver--mjvqz-eth0" May 17 00:37:34.761665 env[1373]: 2025-05-17 00:37:34.744 [INFO][2809] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="aa4676902eb769ce36711c10eaa99cd862190e57199ef5ffd404b30133605c7c" Namespace="calico-system" Pod="csi-node-driver-mjvqz" WorkloadEndpoint="10.200.4.22-k8s-csi--node--driver--mjvqz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.22-k8s-csi--node--driver--mjvqz-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4c0874f4-3d52-4bc3-91d1-2863ef2820cc", ResourceVersion:"1443", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.22", ContainerID:"aa4676902eb769ce36711c10eaa99cd862190e57199ef5ffd404b30133605c7c", Pod:"csi-node-driver-mjvqz", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.35.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali17c591de095", MAC:"f2:04:31:72:2e:21", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:37:34.761665 env[1373]: 2025-05-17 00:37:34.755 [INFO][2809] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="aa4676902eb769ce36711c10eaa99cd862190e57199ef5ffd404b30133605c7c" Namespace="calico-system" Pod="csi-node-driver-mjvqz" WorkloadEndpoint="10.200.4.22-k8s-csi--node--driver--mjvqz-eth0" May 17 00:37:34.777985 env[1373]: time="2025-05-17T00:37:34.777922607Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:37:34.778173 env[1373]: time="2025-05-17T00:37:34.777958908Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:37:34.778173 env[1373]: time="2025-05-17T00:37:34.777972308Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:37:34.778305 env[1373]: time="2025-05-17T00:37:34.778175011Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/aa4676902eb769ce36711c10eaa99cd862190e57199ef5ffd404b30133605c7c pid=2850 runtime=io.containerd.runc.v2 May 17 00:37:34.804838 systemd[1]: Started cri-containerd-aa4676902eb769ce36711c10eaa99cd862190e57199ef5ffd404b30133605c7c.scope. May 17 00:37:34.776000 audit[2840]: NETFILTER_CFG table=filter:76 family=2 entries=38 op=nft_register_chain pid=2840 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:37:34.817822 kernel: kauditd_printk_skb: 554 callbacks suppressed May 17 00:37:34.817890 kernel: audit: type=1325 audit(1747442254.776:634): table=filter:76 family=2 entries=38 op=nft_register_chain pid=2840 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:37:34.776000 audit[2840]: SYSCALL arch=c000003e syscall=46 success=yes exit=21364 a0=3 a1=7ffeb9650780 a2=0 a3=7ffeb965076c items=0 ppid=2626 pid=2840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:34.846406 kernel: audit: type=1300 audit(1747442254.776:634): arch=c000003e syscall=46 success=yes exit=21364 a0=3 a1=7ffeb9650780 a2=0 a3=7ffeb965076c items=0 ppid=2626 pid=2840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:34.776000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:37:34.858284 kernel: audit: type=1327 audit(1747442254.776:634): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:37:34.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.872028 kernel: audit: type=1400 audit(1747442254.831:635): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.886787 env[1373]: time="2025-05-17T00:37:34.886746313Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-mjvqz,Uid:4c0874f4-3d52-4bc3-91d1-2863ef2820cc,Namespace:calico-system,Attempt:1,} returns sandbox id \"aa4676902eb769ce36711c10eaa99cd862190e57199ef5ffd404b30133605c7c\"" May 17 00:37:34.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.888620 env[1373]: time="2025-05-17T00:37:34.888595946Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\"" May 17 00:37:34.897838 kernel: audit: type=1400 audit(1747442254.831:636): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.897926 kernel: audit: type=1400 audit(1747442254.831:637): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.897990 kernel: audit: type=1400 audit(1747442254.831:638): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.913166 kernel: audit: type=1400 audit(1747442254.831:639): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.931826 kernel: audit: type=1400 audit(1747442254.831:640): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.931893 kernel: audit: type=1400 audit(1747442254.831:641): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.858000 audit: BPF prog-id=95 op=LOAD May 17 00:37:34.858000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.858000 audit[2861]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2850 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:34.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161343637363930326562373639636533363731316331306561613939 May 17 00:37:34.858000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.858000 audit[2861]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2850 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:34.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161343637363930326562373639636533363731316331306561613939 May 17 00:37:34.858000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.858000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.858000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.858000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.858000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.858000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.858000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.858000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.858000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.858000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.858000 audit: BPF prog-id=96 op=LOAD May 17 00:37:34.858000 audit[2861]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00030af10 items=0 ppid=2850 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:34.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161343637363930326562373639636533363731316331306561613939 May 17 00:37:34.870000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.870000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.870000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.870000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.870000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.870000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.870000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.870000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.870000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.870000 audit: BPF prog-id=97 op=LOAD May 17 00:37:34.870000 audit[2861]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00030af58 items=0 ppid=2850 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:34.870000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161343637363930326562373639636533363731316331306561613939 May 17 00:37:34.870000 audit: BPF prog-id=97 op=UNLOAD May 17 00:37:34.870000 audit: BPF prog-id=96 op=UNLOAD May 17 00:37:34.870000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.870000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.870000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.870000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.870000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.870000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.870000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.870000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.870000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.870000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.870000 audit: BPF prog-id=98 op=LOAD May 17 00:37:34.870000 audit[2861]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00030b368 items=0 ppid=2850 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:34.870000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161343637363930326562373639636533363731316331306561613939 May 17 00:37:35.468011 kubelet[1889]: E0517 00:37:35.467951 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:35.588274 systemd[1]: run-containerd-runc-k8s.io-aa4676902eb769ce36711c10eaa99cd862190e57199ef5ffd404b30133605c7c-runc.cqj1rw.mount: Deactivated successfully. May 17 00:37:36.377978 env[1373]: time="2025-05-17T00:37:36.377922265Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:36.385883 env[1373]: time="2025-05-17T00:37:36.385817497Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d5b08093b7928c0ac1122e59edf69b2e58c6d10ecc8b9e5cffeb809a956dc48e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:36.392041 env[1373]: time="2025-05-17T00:37:36.391983999Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:36.423973 env[1373]: time="2025-05-17T00:37:36.423916231Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:27883a4104876fe239311dd93ce6efd0c4a87de7163d57a4c8d96bd65a287ffd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:36.424574 env[1373]: time="2025-05-17T00:37:36.424536341Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\" returns image reference \"sha256:d5b08093b7928c0ac1122e59edf69b2e58c6d10ecc8b9e5cffeb809a956dc48e\"" May 17 00:37:36.433567 env[1373]: time="2025-05-17T00:37:36.433531191Z" level=info msg="CreateContainer within sandbox \"aa4676902eb769ce36711c10eaa99cd862190e57199ef5ffd404b30133605c7c\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 17 00:37:36.468998 kubelet[1889]: E0517 00:37:36.468959 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:36.476621 env[1373]: time="2025-05-17T00:37:36.476571207Z" level=info msg="CreateContainer within sandbox \"aa4676902eb769ce36711c10eaa99cd862190e57199ef5ffd404b30133605c7c\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"42e725f9854c772a5fc8a48e846bb58930721c1c15ec45b559d914fcccc837fb\"" May 17 00:37:36.477288 env[1373]: time="2025-05-17T00:37:36.477189218Z" level=info msg="StartContainer for \"42e725f9854c772a5fc8a48e846bb58930721c1c15ec45b559d914fcccc837fb\"" May 17 00:37:36.503365 systemd[1]: run-containerd-runc-k8s.io-42e725f9854c772a5fc8a48e846bb58930721c1c15ec45b559d914fcccc837fb-runc.kbjIr5.mount: Deactivated successfully. May 17 00:37:36.508770 systemd[1]: Started cri-containerd-42e725f9854c772a5fc8a48e846bb58930721c1c15ec45b559d914fcccc837fb.scope. May 17 00:37:36.523000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.523000 audit[2899]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f7e0e29a2f8 items=0 ppid=2850 pid=2899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:36.523000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432653732356639383534633737326135666338613438653834366262 May 17 00:37:36.524000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.524000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.524000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.524000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.524000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.524000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.524000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.524000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.524000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.524000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.524000 audit: BPF prog-id=99 op=LOAD May 17 00:37:36.524000 audit[2899]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000024408 items=0 ppid=2850 pid=2899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:36.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432653732356639383534633737326135666338613438653834366262 May 17 00:37:36.524000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.524000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.524000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.524000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.524000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.524000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.524000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.524000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.524000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.524000 audit: BPF prog-id=100 op=LOAD May 17 00:37:36.524000 audit[2899]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000024458 items=0 ppid=2850 pid=2899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:36.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432653732356639383534633737326135666338613438653834366262 May 17 00:37:36.525000 audit: BPF prog-id=100 op=UNLOAD May 17 00:37:36.525000 audit: BPF prog-id=99 op=UNLOAD May 17 00:37:36.525000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.525000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.525000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.525000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.525000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.525000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.525000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.525000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.525000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.525000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.525000 audit: BPF prog-id=101 op=LOAD May 17 00:37:36.525000 audit[2899]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0000244e8 items=0 ppid=2850 pid=2899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:36.525000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432653732356639383534633737326135666338613438653834366262 May 17 00:37:36.540653 env[1373]: time="2025-05-17T00:37:36.540611074Z" level=info msg="StartContainer for \"42e725f9854c772a5fc8a48e846bb58930721c1c15ec45b559d914fcccc837fb\" returns successfully" May 17 00:37:36.542050 env[1373]: time="2025-05-17T00:37:36.542022097Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\"" May 17 00:37:36.700648 systemd-networkd[1526]: cali17c591de095: Gained IPv6LL May 17 00:37:37.469382 kubelet[1889]: E0517 00:37:37.469328 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:37.976632 env[1373]: time="2025-05-17T00:37:37.976587872Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:37.984684 env[1373]: time="2025-05-17T00:37:37.984636102Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:45c8692ffc029387ee93ba83da8ad26da9749cf2ba6ed03981f8f9933ed5a5b0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:37.989512 env[1373]: time="2025-05-17T00:37:37.989475381Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:37.993830 env[1373]: time="2025-05-17T00:37:37.993780251Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:dca5c16181edde2e860463615523ce457cd9dcfca85b7cfdcd6f3ea7de6f2ac8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:37.994313 env[1373]: time="2025-05-17T00:37:37.994281959Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\" returns image reference \"sha256:45c8692ffc029387ee93ba83da8ad26da9749cf2ba6ed03981f8f9933ed5a5b0\"" May 17 00:37:38.001013 env[1373]: time="2025-05-17T00:37:38.000977367Z" level=info msg="CreateContainer within sandbox \"aa4676902eb769ce36711c10eaa99cd862190e57199ef5ffd404b30133605c7c\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 17 00:37:38.027741 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1720937484.mount: Deactivated successfully. May 17 00:37:38.044542 env[1373]: time="2025-05-17T00:37:38.044490056Z" level=info msg="CreateContainer within sandbox \"aa4676902eb769ce36711c10eaa99cd862190e57199ef5ffd404b30133605c7c\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"17b271141c648dc55feb3341a84e83f6b0f53e733fcdaa3ae51698de94e1c98d\"" May 17 00:37:38.045357 env[1373]: time="2025-05-17T00:37:38.045242668Z" level=info msg="StartContainer for \"17b271141c648dc55feb3341a84e83f6b0f53e733fcdaa3ae51698de94e1c98d\"" May 17 00:37:38.075001 systemd[1]: run-containerd-runc-k8s.io-17b271141c648dc55feb3341a84e83f6b0f53e733fcdaa3ae51698de94e1c98d-runc.eDZHj2.mount: Deactivated successfully. May 17 00:37:38.077017 systemd[1]: Started cri-containerd-17b271141c648dc55feb3341a84e83f6b0f53e733fcdaa3ae51698de94e1c98d.scope. May 17 00:37:38.089000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.089000 audit[2935]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=7f2188113f78 items=0 ppid=2850 pid=2935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:38.089000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137623237313134316336343864633535666562333334316138346538 May 17 00:37:38.090000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.090000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.090000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.090000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.090000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.090000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.090000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.090000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.090000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.090000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.090000 audit: BPF prog-id=102 op=LOAD May 17 00:37:38.090000 audit[2935]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c59d8 a2=78 a3=c0003dc1c8 items=0 ppid=2850 pid=2935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:38.090000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137623237313134316336343864633535666562333334316138346538 May 17 00:37:38.090000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.090000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.090000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.090000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.090000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.090000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.090000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.090000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.090000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.090000 audit: BPF prog-id=103 op=LOAD May 17 00:37:38.090000 audit[2935]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001c5770 a2=78 a3=c0003dc218 items=0 ppid=2850 pid=2935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:38.090000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137623237313134316336343864633535666562333334316138346538 May 17 00:37:38.090000 audit: BPF prog-id=103 op=UNLOAD May 17 00:37:38.090000 audit: BPF prog-id=102 op=UNLOAD May 17 00:37:38.090000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.090000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.090000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.090000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.090000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.090000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.090000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.090000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.090000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.090000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.090000 audit: BPF prog-id=104 op=LOAD May 17 00:37:38.090000 audit[2935]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c5c30 a2=78 a3=c0003dc2a8 items=0 ppid=2850 pid=2935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:38.090000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137623237313134316336343864633535666562333334316138346538 May 17 00:37:38.112306 env[1373]: time="2025-05-17T00:37:38.112269529Z" level=info msg="StartContainer for \"17b271141c648dc55feb3341a84e83f6b0f53e733fcdaa3ae51698de94e1c98d\" returns successfully" May 17 00:37:38.470289 kubelet[1889]: E0517 00:37:38.470247 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:38.505984 env[1373]: time="2025-05-17T00:37:38.505934359Z" level=info msg="StopPodSandbox for \"b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae\"" May 17 00:37:38.568443 kubelet[1889]: I0517 00:37:38.567073 1889 csi_plugin.go:106] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 17 00:37:38.568443 kubelet[1889]: I0517 00:37:38.567119 1889 csi_plugin.go:119] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 17 00:37:38.657586 kubelet[1889]: I0517 00:37:38.657494 1889 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-mjvqz" podStartSLOduration=33.550172918 podStartE2EDuration="36.657469558s" podCreationTimestamp="2025-05-17 00:37:02 +0000 UTC" firstStartedPulling="2025-05-17 00:37:34.888090337 +0000 UTC m=+33.353147546" lastFinishedPulling="2025-05-17 00:37:37.995387077 +0000 UTC m=+36.460444186" observedRunningTime="2025-05-17 00:37:38.657020751 +0000 UTC m=+37.122077960" watchObservedRunningTime="2025-05-17 00:37:38.657469558 +0000 UTC m=+37.122526767" May 17 00:37:38.659176 env[1373]: 2025-05-17 00:37:38.559 [INFO][2972] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae" May 17 00:37:38.659176 env[1373]: 2025-05-17 00:37:38.560 [INFO][2972] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae" iface="eth0" netns="/var/run/netns/cni-0145ed4a-71cf-63d0-88ef-529334496f7b" May 17 00:37:38.659176 env[1373]: 2025-05-17 00:37:38.560 [INFO][2972] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae" iface="eth0" netns="/var/run/netns/cni-0145ed4a-71cf-63d0-88ef-529334496f7b" May 17 00:37:38.659176 env[1373]: 2025-05-17 00:37:38.560 [INFO][2972] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae" iface="eth0" netns="/var/run/netns/cni-0145ed4a-71cf-63d0-88ef-529334496f7b" May 17 00:37:38.659176 env[1373]: 2025-05-17 00:37:38.560 [INFO][2972] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae" May 17 00:37:38.659176 env[1373]: 2025-05-17 00:37:38.560 [INFO][2972] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae" May 17 00:37:38.659176 env[1373]: 2025-05-17 00:37:38.590 [INFO][2979] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae" HandleID="k8s-pod-network.b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae" Workload="10.200.4.22-k8s-nginx--deployment--7fcdb87857--zt87t-eth0" May 17 00:37:38.659176 env[1373]: 2025-05-17 00:37:38.590 [INFO][2979] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:38.659176 env[1373]: 2025-05-17 00:37:38.590 [INFO][2979] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:38.659176 env[1373]: 2025-05-17 00:37:38.625 [WARNING][2979] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae" HandleID="k8s-pod-network.b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae" Workload="10.200.4.22-k8s-nginx--deployment--7fcdb87857--zt87t-eth0" May 17 00:37:38.659176 env[1373]: 2025-05-17 00:37:38.625 [INFO][2979] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae" HandleID="k8s-pod-network.b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae" Workload="10.200.4.22-k8s-nginx--deployment--7fcdb87857--zt87t-eth0" May 17 00:37:38.659176 env[1373]: 2025-05-17 00:37:38.655 [INFO][2979] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:38.659176 env[1373]: 2025-05-17 00:37:38.657 [INFO][2972] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae" May 17 00:37:38.659918 env[1373]: time="2025-05-17T00:37:38.659443089Z" level=info msg="TearDown network for sandbox \"b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae\" successfully" May 17 00:37:38.659918 env[1373]: time="2025-05-17T00:37:38.659493690Z" level=info msg="StopPodSandbox for \"b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae\" returns successfully" May 17 00:37:38.660260 env[1373]: time="2025-05-17T00:37:38.660224601Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-zt87t,Uid:4ba22c34-84c6-4a75-9e17-9038b998708b,Namespace:default,Attempt:1,}" May 17 00:37:38.817681 systemd-networkd[1526]: cali6f62d572bd6: Link UP May 17 00:37:38.825420 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:37:38.825510 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6f62d572bd6: link becomes ready May 17 00:37:38.832847 systemd-networkd[1526]: cali6f62d572bd6: Gained carrier May 17 00:37:38.849075 env[1373]: 2025-05-17 00:37:38.740 [INFO][2989] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.4.22-k8s-nginx--deployment--7fcdb87857--zt87t-eth0 nginx-deployment-7fcdb87857- default 4ba22c34-84c6-4a75-9e17-9038b998708b 1463 0 2025-05-17 00:37:24 +0000 UTC map[app:nginx pod-template-hash:7fcdb87857 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.4.22 nginx-deployment-7fcdb87857-zt87t eth0 default [] [] [kns.default ksa.default.default] cali6f62d572bd6 [] [] }} ContainerID="f4c21a90da3cfea07a0a1ca4867991f6283a047e0ad96f24e0961a82e1f6cb51" Namespace="default" Pod="nginx-deployment-7fcdb87857-zt87t" WorkloadEndpoint="10.200.4.22-k8s-nginx--deployment--7fcdb87857--zt87t-" May 17 00:37:38.849075 env[1373]: 2025-05-17 00:37:38.740 [INFO][2989] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="f4c21a90da3cfea07a0a1ca4867991f6283a047e0ad96f24e0961a82e1f6cb51" Namespace="default" Pod="nginx-deployment-7fcdb87857-zt87t" WorkloadEndpoint="10.200.4.22-k8s-nginx--deployment--7fcdb87857--zt87t-eth0" May 17 00:37:38.849075 env[1373]: 2025-05-17 00:37:38.773 [INFO][3002] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f4c21a90da3cfea07a0a1ca4867991f6283a047e0ad96f24e0961a82e1f6cb51" HandleID="k8s-pod-network.f4c21a90da3cfea07a0a1ca4867991f6283a047e0ad96f24e0961a82e1f6cb51" Workload="10.200.4.22-k8s-nginx--deployment--7fcdb87857--zt87t-eth0" May 17 00:37:38.849075 env[1373]: 2025-05-17 00:37:38.773 [INFO][3002] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f4c21a90da3cfea07a0a1ca4867991f6283a047e0ad96f24e0961a82e1f6cb51" HandleID="k8s-pod-network.f4c21a90da3cfea07a0a1ca4867991f6283a047e0ad96f24e0961a82e1f6cb51" Workload="10.200.4.22-k8s-nginx--deployment--7fcdb87857--zt87t-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002b74d0), Attrs:map[string]string{"namespace":"default", "node":"10.200.4.22", "pod":"nginx-deployment-7fcdb87857-zt87t", "timestamp":"2025-05-17 00:37:38.773130389 +0000 UTC"}, Hostname:"10.200.4.22", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:37:38.849075 env[1373]: 2025-05-17 00:37:38.773 [INFO][3002] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:38.849075 env[1373]: 2025-05-17 00:37:38.773 [INFO][3002] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:38.849075 env[1373]: 2025-05-17 00:37:38.773 [INFO][3002] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.4.22' May 17 00:37:38.849075 env[1373]: 2025-05-17 00:37:38.780 [INFO][3002] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.f4c21a90da3cfea07a0a1ca4867991f6283a047e0ad96f24e0961a82e1f6cb51" host="10.200.4.22" May 17 00:37:38.849075 env[1373]: 2025-05-17 00:37:38.785 [INFO][3002] ipam/ipam.go 394: Looking up existing affinities for host host="10.200.4.22" May 17 00:37:38.849075 env[1373]: 2025-05-17 00:37:38.790 [INFO][3002] ipam/ipam.go 511: Trying affinity for 192.168.35.128/26 host="10.200.4.22" May 17 00:37:38.849075 env[1373]: 2025-05-17 00:37:38.793 [INFO][3002] ipam/ipam.go 158: Attempting to load block cidr=192.168.35.128/26 host="10.200.4.22" May 17 00:37:38.849075 env[1373]: 2025-05-17 00:37:38.797 [INFO][3002] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.35.128/26 host="10.200.4.22" May 17 00:37:38.849075 env[1373]: 2025-05-17 00:37:38.797 [INFO][3002] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.35.128/26 handle="k8s-pod-network.f4c21a90da3cfea07a0a1ca4867991f6283a047e0ad96f24e0961a82e1f6cb51" host="10.200.4.22" May 17 00:37:38.849075 env[1373]: 2025-05-17 00:37:38.798 [INFO][3002] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.f4c21a90da3cfea07a0a1ca4867991f6283a047e0ad96f24e0961a82e1f6cb51 May 17 00:37:38.849075 env[1373]: 2025-05-17 00:37:38.802 [INFO][3002] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.35.128/26 handle="k8s-pod-network.f4c21a90da3cfea07a0a1ca4867991f6283a047e0ad96f24e0961a82e1f6cb51" host="10.200.4.22" May 17 00:37:38.849075 env[1373]: 2025-05-17 00:37:38.811 [INFO][3002] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.35.130/26] block=192.168.35.128/26 handle="k8s-pod-network.f4c21a90da3cfea07a0a1ca4867991f6283a047e0ad96f24e0961a82e1f6cb51" host="10.200.4.22" May 17 00:37:38.849075 env[1373]: 2025-05-17 00:37:38.811 [INFO][3002] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.35.130/26] handle="k8s-pod-network.f4c21a90da3cfea07a0a1ca4867991f6283a047e0ad96f24e0961a82e1f6cb51" host="10.200.4.22" May 17 00:37:38.849075 env[1373]: 2025-05-17 00:37:38.811 [INFO][3002] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:38.849075 env[1373]: 2025-05-17 00:37:38.811 [INFO][3002] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.35.130/26] IPv6=[] ContainerID="f4c21a90da3cfea07a0a1ca4867991f6283a047e0ad96f24e0961a82e1f6cb51" HandleID="k8s-pod-network.f4c21a90da3cfea07a0a1ca4867991f6283a047e0ad96f24e0961a82e1f6cb51" Workload="10.200.4.22-k8s-nginx--deployment--7fcdb87857--zt87t-eth0" May 17 00:37:38.850218 env[1373]: 2025-05-17 00:37:38.812 [INFO][2989] cni-plugin/k8s.go 418: Populated endpoint ContainerID="f4c21a90da3cfea07a0a1ca4867991f6283a047e0ad96f24e0961a82e1f6cb51" Namespace="default" Pod="nginx-deployment-7fcdb87857-zt87t" WorkloadEndpoint="10.200.4.22-k8s-nginx--deployment--7fcdb87857--zt87t-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.22-k8s-nginx--deployment--7fcdb87857--zt87t-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"4ba22c34-84c6-4a75-9e17-9038b998708b", ResourceVersion:"1463", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.22", ContainerID:"", Pod:"nginx-deployment-7fcdb87857-zt87t", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.35.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali6f62d572bd6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:37:38.850218 env[1373]: 2025-05-17 00:37:38.812 [INFO][2989] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.35.130/32] ContainerID="f4c21a90da3cfea07a0a1ca4867991f6283a047e0ad96f24e0961a82e1f6cb51" Namespace="default" Pod="nginx-deployment-7fcdb87857-zt87t" WorkloadEndpoint="10.200.4.22-k8s-nginx--deployment--7fcdb87857--zt87t-eth0" May 17 00:37:38.850218 env[1373]: 2025-05-17 00:37:38.813 [INFO][2989] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali6f62d572bd6 ContainerID="f4c21a90da3cfea07a0a1ca4867991f6283a047e0ad96f24e0961a82e1f6cb51" Namespace="default" Pod="nginx-deployment-7fcdb87857-zt87t" WorkloadEndpoint="10.200.4.22-k8s-nginx--deployment--7fcdb87857--zt87t-eth0" May 17 00:37:38.850218 env[1373]: 2025-05-17 00:37:38.834 [INFO][2989] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f4c21a90da3cfea07a0a1ca4867991f6283a047e0ad96f24e0961a82e1f6cb51" Namespace="default" Pod="nginx-deployment-7fcdb87857-zt87t" WorkloadEndpoint="10.200.4.22-k8s-nginx--deployment--7fcdb87857--zt87t-eth0" May 17 00:37:38.850218 env[1373]: 2025-05-17 00:37:38.834 [INFO][2989] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="f4c21a90da3cfea07a0a1ca4867991f6283a047e0ad96f24e0961a82e1f6cb51" Namespace="default" Pod="nginx-deployment-7fcdb87857-zt87t" WorkloadEndpoint="10.200.4.22-k8s-nginx--deployment--7fcdb87857--zt87t-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.22-k8s-nginx--deployment--7fcdb87857--zt87t-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"4ba22c34-84c6-4a75-9e17-9038b998708b", ResourceVersion:"1463", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.22", ContainerID:"f4c21a90da3cfea07a0a1ca4867991f6283a047e0ad96f24e0961a82e1f6cb51", Pod:"nginx-deployment-7fcdb87857-zt87t", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.35.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali6f62d572bd6", MAC:"e2:c4:b1:52:13:84", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:37:38.850218 env[1373]: 2025-05-17 00:37:38.847 [INFO][2989] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="f4c21a90da3cfea07a0a1ca4867991f6283a047e0ad96f24e0961a82e1f6cb51" Namespace="default" Pod="nginx-deployment-7fcdb87857-zt87t" WorkloadEndpoint="10.200.4.22-k8s-nginx--deployment--7fcdb87857--zt87t-eth0" May 17 00:37:38.864000 audit[3018]: NETFILTER_CFG table=filter:77 family=2 entries=42 op=nft_register_chain pid=3018 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:37:38.864000 audit[3018]: SYSCALL arch=c000003e syscall=46 success=yes exit=22512 a0=3 a1=7ffdfdc9af70 a2=0 a3=7ffdfdc9af5c items=0 ppid=2626 pid=3018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:38.864000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:37:38.868265 env[1373]: time="2025-05-17T00:37:38.868196793Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:37:38.868265 env[1373]: time="2025-05-17T00:37:38.868234294Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:37:38.868648 env[1373]: time="2025-05-17T00:37:38.868247994Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:37:38.868648 env[1373]: time="2025-05-17T00:37:38.868366896Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f4c21a90da3cfea07a0a1ca4867991f6283a047e0ad96f24e0961a82e1f6cb51 pid=3026 runtime=io.containerd.runc.v2 May 17 00:37:38.882680 systemd[1]: Started cri-containerd-f4c21a90da3cfea07a0a1ca4867991f6283a047e0ad96f24e0961a82e1f6cb51.scope. May 17 00:37:38.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.897000 audit: BPF prog-id=105 op=LOAD May 17 00:37:38.897000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.897000 audit[3037]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3026 pid=3037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:38.897000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634633231613930646133636665613037613061316361343836373939 May 17 00:37:38.897000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.897000 audit[3037]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3026 pid=3037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:38.897000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634633231613930646133636665613037613061316361343836373939 May 17 00:37:38.897000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.897000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.897000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.897000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.897000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.897000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.897000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.897000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.897000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.897000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.897000 audit: BPF prog-id=106 op=LOAD May 17 00:37:38.897000 audit[3037]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003b6020 items=0 ppid=3026 pid=3037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:38.897000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634633231613930646133636665613037613061316361343836373939 May 17 00:37:38.897000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.897000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.897000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.897000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.897000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.897000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.897000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.897000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.897000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.897000 audit: BPF prog-id=107 op=LOAD May 17 00:37:38.897000 audit[3037]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003b6068 items=0 ppid=3026 pid=3037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:38.897000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634633231613930646133636665613037613061316361343836373939 May 17 00:37:38.898000 audit: BPF prog-id=107 op=UNLOAD May 17 00:37:38.898000 audit: BPF prog-id=106 op=UNLOAD May 17 00:37:38.898000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.898000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.898000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.898000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.898000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.898000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.898000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.898000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.898000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.898000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.898000 audit: BPF prog-id=108 op=LOAD May 17 00:37:38.898000 audit[3037]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003b6478 items=0 ppid=3026 pid=3037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:38.898000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634633231613930646133636665613037613061316361343836373939 May 17 00:37:38.925747 env[1373]: time="2025-05-17T00:37:38.925695503Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-zt87t,Uid:4ba22c34-84c6-4a75-9e17-9038b998708b,Namespace:default,Attempt:1,} returns sandbox id \"f4c21a90da3cfea07a0a1ca4867991f6283a047e0ad96f24e0961a82e1f6cb51\"" May 17 00:37:38.927798 env[1373]: time="2025-05-17T00:37:38.927759436Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 17 00:37:39.028052 systemd[1]: run-netns-cni\x2d0145ed4a\x2d71cf\x2d63d0\x2d88ef\x2d529334496f7b.mount: Deactivated successfully. May 17 00:37:39.471018 kubelet[1889]: E0517 00:37:39.470951 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:40.471760 kubelet[1889]: E0517 00:37:40.471713 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:40.796270 systemd-networkd[1526]: cali6f62d572bd6: Gained IPv6LL May 17 00:37:41.472682 kubelet[1889]: E0517 00:37:41.472632 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:41.948378 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2065566000.mount: Deactivated successfully. May 17 00:37:42.434965 kubelet[1889]: E0517 00:37:42.434924 1889 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:42.472913 kubelet[1889]: E0517 00:37:42.472875 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:43.474012 kubelet[1889]: E0517 00:37:43.473961 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:43.515262 env[1373]: time="2025-05-17T00:37:43.515206821Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:43.524148 env[1373]: time="2025-05-17T00:37:43.524091445Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:43.529733 env[1373]: time="2025-05-17T00:37:43.529689223Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:43.536303 env[1373]: time="2025-05-17T00:37:43.536265715Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:43.536914 env[1373]: time="2025-05-17T00:37:43.536880924Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa\"" May 17 00:37:43.543402 env[1373]: time="2025-05-17T00:37:43.543368315Z" level=info msg="CreateContainer within sandbox \"f4c21a90da3cfea07a0a1ca4867991f6283a047e0ad96f24e0961a82e1f6cb51\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" May 17 00:37:43.596481 env[1373]: time="2025-05-17T00:37:43.596431957Z" level=info msg="CreateContainer within sandbox \"f4c21a90da3cfea07a0a1ca4867991f6283a047e0ad96f24e0961a82e1f6cb51\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"95b5dd1c15f0bfd7cc8d207edd8e4f38aaa1430837b18cad4394fadc12e084cb\"" May 17 00:37:43.597302 env[1373]: time="2025-05-17T00:37:43.597269169Z" level=info msg="StartContainer for \"95b5dd1c15f0bfd7cc8d207edd8e4f38aaa1430837b18cad4394fadc12e084cb\"" May 17 00:37:43.624713 systemd[1]: run-containerd-runc-k8s.io-95b5dd1c15f0bfd7cc8d207edd8e4f38aaa1430837b18cad4394fadc12e084cb-runc.K6CPay.mount: Deactivated successfully. May 17 00:37:43.629914 systemd[1]: Started cri-containerd-95b5dd1c15f0bfd7cc8d207edd8e4f38aaa1430837b18cad4394fadc12e084cb.scope. May 17 00:37:43.656068 kernel: kauditd_printk_skb: 196 callbacks suppressed May 17 00:37:43.656215 kernel: audit: type=1400 audit(1747442263.638:684): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:43.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:43.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:43.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:43.680562 kernel: audit: type=1400 audit(1747442263.638:685): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:43.680652 kernel: audit: type=1400 audit(1747442263.638:686): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:43.680678 kernel: audit: type=1400 audit(1747442263.638:687): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:43.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:43.693043 kernel: audit: type=1400 audit(1747442263.638:688): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:43.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:43.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:43.715784 kernel: audit: type=1400 audit(1747442263.638:689): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:43.715934 kernel: audit: type=1400 audit(1747442263.638:690): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:43.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:43.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:43.738809 kernel: audit: type=1400 audit(1747442263.638:691): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:43.750312 kernel: audit: type=1400 audit(1747442263.638:692): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:43.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:43.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:43.766159 kernel: audit: type=1400 audit(1747442263.655:693): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:43.655000 audit: BPF prog-id=109 op=LOAD May 17 00:37:43.661000 audit[3074]: AVC avc: denied { bpf } for pid=3074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:43.661000 audit[3074]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3026 pid=3074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:43.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935623564643163313566306266643763633864323037656464386534 May 17 00:37:43.661000 audit[3074]: AVC avc: denied { perfmon } for pid=3074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:43.661000 audit[3074]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3026 pid=3074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:43.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935623564643163313566306266643763633864323037656464386534 May 17 00:37:43.661000 audit[3074]: AVC avc: denied { bpf } for pid=3074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:43.661000 audit[3074]: AVC avc: denied { bpf } for pid=3074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:43.661000 audit[3074]: AVC avc: denied { bpf } for pid=3074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:43.661000 audit[3074]: AVC avc: denied { perfmon } for pid=3074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:43.661000 audit[3074]: AVC avc: denied { perfmon } for pid=3074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:43.661000 audit[3074]: AVC avc: denied { perfmon } for pid=3074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:43.661000 audit[3074]: AVC avc: denied { perfmon } for pid=3074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:43.661000 audit[3074]: AVC avc: denied { perfmon } for pid=3074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:43.661000 audit[3074]: AVC avc: denied { bpf } for pid=3074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:43.661000 audit[3074]: AVC avc: denied { bpf } for pid=3074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:43.661000 audit: BPF prog-id=110 op=LOAD May 17 00:37:43.661000 audit[3074]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000394010 items=0 ppid=3026 pid=3074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:43.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935623564643163313566306266643763633864323037656464386534 May 17 00:37:43.668000 audit[3074]: AVC avc: denied { bpf } for pid=3074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:43.668000 audit[3074]: AVC avc: denied { bpf } for pid=3074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:43.668000 audit[3074]: AVC avc: denied { perfmon } for pid=3074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:43.668000 audit[3074]: AVC avc: denied { perfmon } for pid=3074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:43.668000 audit[3074]: AVC avc: denied { perfmon } for pid=3074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:43.668000 audit[3074]: AVC avc: denied { perfmon } for pid=3074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:43.668000 audit[3074]: AVC avc: denied { perfmon } for pid=3074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:43.668000 audit[3074]: AVC avc: denied { bpf } for pid=3074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:43.668000 audit[3074]: AVC avc: denied { bpf } for pid=3074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:43.668000 audit: BPF prog-id=111 op=LOAD May 17 00:37:43.668000 audit[3074]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000394058 items=0 ppid=3026 pid=3074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:43.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935623564643163313566306266643763633864323037656464386534 May 17 00:37:43.703000 audit: BPF prog-id=111 op=UNLOAD May 17 00:37:43.703000 audit: BPF prog-id=110 op=UNLOAD May 17 00:37:43.703000 audit[3074]: AVC avc: denied { bpf } for pid=3074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:43.703000 audit[3074]: AVC avc: denied { bpf } for pid=3074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:43.703000 audit[3074]: AVC avc: denied { bpf } for pid=3074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:43.703000 audit[3074]: AVC avc: denied { perfmon } for pid=3074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:43.703000 audit[3074]: AVC avc: denied { perfmon } for pid=3074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:43.703000 audit[3074]: AVC avc: denied { perfmon } for pid=3074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:43.703000 audit[3074]: AVC avc: denied { perfmon } for pid=3074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:43.703000 audit[3074]: AVC avc: denied { perfmon } for pid=3074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:43.703000 audit[3074]: AVC avc: denied { bpf } for pid=3074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:43.703000 audit[3074]: AVC avc: denied { bpf } for pid=3074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:43.703000 audit: BPF prog-id=112 op=LOAD May 17 00:37:43.703000 audit[3074]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000394468 items=0 ppid=3026 pid=3074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:43.703000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935623564643163313566306266643763633864323037656464386534 May 17 00:37:43.782652 env[1373]: time="2025-05-17T00:37:43.782607863Z" level=info msg="StartContainer for \"95b5dd1c15f0bfd7cc8d207edd8e4f38aaa1430837b18cad4394fadc12e084cb\" returns successfully" May 17 00:37:44.474734 kubelet[1889]: E0517 00:37:44.474675 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:44.631437 kubelet[1889]: I0517 00:37:44.631318 1889 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-7fcdb87857-zt87t" podStartSLOduration=16.020531419 podStartE2EDuration="20.631301931s" podCreationTimestamp="2025-05-17 00:37:24 +0000 UTC" firstStartedPulling="2025-05-17 00:37:38.927313929 +0000 UTC m=+37.392371138" lastFinishedPulling="2025-05-17 00:37:43.538084541 +0000 UTC m=+42.003141650" observedRunningTime="2025-05-17 00:37:44.63122293 +0000 UTC m=+43.096280039" watchObservedRunningTime="2025-05-17 00:37:44.631301931 +0000 UTC m=+43.096359040" May 17 00:37:45.474889 kubelet[1889]: E0517 00:37:45.474827 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:46.475370 kubelet[1889]: E0517 00:37:46.475313 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:47.475556 kubelet[1889]: E0517 00:37:47.475500 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:48.475865 kubelet[1889]: E0517 00:37:48.475807 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:49.476399 kubelet[1889]: E0517 00:37:49.476343 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:50.476583 kubelet[1889]: E0517 00:37:50.476525 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:51.477846 kubelet[1889]: E0517 00:37:51.477770 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:52.478760 kubelet[1889]: E0517 00:37:52.478706 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:53.449000 audit[3132]: NETFILTER_CFG table=filter:78 family=2 entries=24 op=nft_register_rule pid=3132 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:53.454278 kernel: kauditd_printk_skb: 47 callbacks suppressed May 17 00:37:53.454375 kernel: audit: type=1325 audit(1747442273.449:702): table=filter:78 family=2 entries=24 op=nft_register_rule pid=3132 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:53.449000 audit[3132]: SYSCALL arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7ffe37ab2800 a2=0 a3=7ffe37ab27ec items=0 ppid=2066 pid=3132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:53.479559 kubelet[1889]: E0517 00:37:53.479521 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:53.481580 kernel: audit: type=1300 audit(1747442273.449:702): arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7ffe37ab2800 a2=0 a3=7ffe37ab27ec items=0 ppid=2066 pid=3132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:53.481665 kernel: audit: type=1327 audit(1747442273.449:702): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:53.449000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:53.492158 kernel: audit: type=1325 audit(1747442273.481:703): table=nat:79 family=2 entries=22 op=nft_register_rule pid=3132 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:53.481000 audit[3132]: NETFILTER_CFG table=nat:79 family=2 entries=22 op=nft_register_rule pid=3132 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:53.481000 audit[3132]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe37ab2800 a2=0 a3=0 items=0 ppid=2066 pid=3132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:53.500160 kernel: audit: type=1300 audit(1747442273.481:703): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe37ab2800 a2=0 a3=0 items=0 ppid=2066 pid=3132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:53.481000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:53.525971 kernel: audit: type=1327 audit(1747442273.481:703): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:53.531000 audit[3134]: NETFILTER_CFG table=filter:80 family=2 entries=36 op=nft_register_rule pid=3134 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:53.531000 audit[3134]: SYSCALL arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7ffd5584bea0 a2=0 a3=7ffd5584be8c items=0 ppid=2066 pid=3134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:53.560015 kernel: audit: type=1325 audit(1747442273.531:704): table=filter:80 family=2 entries=36 op=nft_register_rule pid=3134 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:53.560097 kernel: audit: type=1300 audit(1747442273.531:704): arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7ffd5584bea0 a2=0 a3=7ffd5584be8c items=0 ppid=2066 pid=3134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:53.560131 kernel: audit: type=1327 audit(1747442273.531:704): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:53.531000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:53.570075 kernel: audit: type=1325 audit(1747442273.544:705): table=nat:81 family=2 entries=22 op=nft_register_rule pid=3134 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:53.544000 audit[3134]: NETFILTER_CFG table=nat:81 family=2 entries=22 op=nft_register_rule pid=3134 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:53.544000 audit[3134]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd5584bea0 a2=0 a3=0 items=0 ppid=2066 pid=3134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:53.544000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:53.624570 systemd[1]: Created slice kubepods-besteffort-pod5fa2ea5c_ff71_473d_a052_1277dec2bac5.slice. May 17 00:37:53.726683 kubelet[1889]: I0517 00:37:53.726495 1889 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-znwch\" (UniqueName: \"kubernetes.io/projected/5fa2ea5c-ff71-473d-a052-1277dec2bac5-kube-api-access-znwch\") pod \"nfs-server-provisioner-0\" (UID: \"5fa2ea5c-ff71-473d-a052-1277dec2bac5\") " pod="default/nfs-server-provisioner-0" May 17 00:37:53.726683 kubelet[1889]: I0517 00:37:53.726561 1889 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/5fa2ea5c-ff71-473d-a052-1277dec2bac5-data\") pod \"nfs-server-provisioner-0\" (UID: \"5fa2ea5c-ff71-473d-a052-1277dec2bac5\") " pod="default/nfs-server-provisioner-0" May 17 00:37:53.928090 env[1373]: time="2025-05-17T00:37:53.928033370Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:5fa2ea5c-ff71-473d-a052-1277dec2bac5,Namespace:default,Attempt:0,}" May 17 00:37:54.073484 systemd-networkd[1526]: cali60e51b789ff: Link UP May 17 00:37:54.083756 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:37:54.083858 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready May 17 00:37:54.084258 systemd-networkd[1526]: cali60e51b789ff: Gained carrier May 17 00:37:54.096548 env[1373]: 2025-05-17 00:37:54.008 [INFO][3137] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.4.22-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 5fa2ea5c-ff71-473d-a052-1277dec2bac5 1535 0 2025-05-17 00:37:53 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.200.4.22 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="599c9dbe93c8280898e0fd1b4ce6e59c5ead335e4568879dc96e928e0536f873" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.4.22-k8s-nfs--server--provisioner--0-" May 17 00:37:54.096548 env[1373]: 2025-05-17 00:37:54.008 [INFO][3137] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="599c9dbe93c8280898e0fd1b4ce6e59c5ead335e4568879dc96e928e0536f873" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.4.22-k8s-nfs--server--provisioner--0-eth0" May 17 00:37:54.096548 env[1373]: 2025-05-17 00:37:54.033 [INFO][3149] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="599c9dbe93c8280898e0fd1b4ce6e59c5ead335e4568879dc96e928e0536f873" HandleID="k8s-pod-network.599c9dbe93c8280898e0fd1b4ce6e59c5ead335e4568879dc96e928e0536f873" Workload="10.200.4.22-k8s-nfs--server--provisioner--0-eth0" May 17 00:37:54.096548 env[1373]: 2025-05-17 00:37:54.033 [INFO][3149] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="599c9dbe93c8280898e0fd1b4ce6e59c5ead335e4568879dc96e928e0536f873" HandleID="k8s-pod-network.599c9dbe93c8280898e0fd1b4ce6e59c5ead335e4568879dc96e928e0536f873" Workload="10.200.4.22-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002cf9e0), Attrs:map[string]string{"namespace":"default", "node":"10.200.4.22", "pod":"nfs-server-provisioner-0", "timestamp":"2025-05-17 00:37:54.033113229 +0000 UTC"}, Hostname:"10.200.4.22", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:37:54.096548 env[1373]: 2025-05-17 00:37:54.033 [INFO][3149] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:54.096548 env[1373]: 2025-05-17 00:37:54.033 [INFO][3149] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:54.096548 env[1373]: 2025-05-17 00:37:54.033 [INFO][3149] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.4.22' May 17 00:37:54.096548 env[1373]: 2025-05-17 00:37:54.041 [INFO][3149] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.599c9dbe93c8280898e0fd1b4ce6e59c5ead335e4568879dc96e928e0536f873" host="10.200.4.22" May 17 00:37:54.096548 env[1373]: 2025-05-17 00:37:54.046 [INFO][3149] ipam/ipam.go 394: Looking up existing affinities for host host="10.200.4.22" May 17 00:37:54.096548 env[1373]: 2025-05-17 00:37:54.050 [INFO][3149] ipam/ipam.go 511: Trying affinity for 192.168.35.128/26 host="10.200.4.22" May 17 00:37:54.096548 env[1373]: 2025-05-17 00:37:54.052 [INFO][3149] ipam/ipam.go 158: Attempting to load block cidr=192.168.35.128/26 host="10.200.4.22" May 17 00:37:54.096548 env[1373]: 2025-05-17 00:37:54.054 [INFO][3149] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.35.128/26 host="10.200.4.22" May 17 00:37:54.096548 env[1373]: 2025-05-17 00:37:54.054 [INFO][3149] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.35.128/26 handle="k8s-pod-network.599c9dbe93c8280898e0fd1b4ce6e59c5ead335e4568879dc96e928e0536f873" host="10.200.4.22" May 17 00:37:54.096548 env[1373]: 2025-05-17 00:37:54.056 [INFO][3149] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.599c9dbe93c8280898e0fd1b4ce6e59c5ead335e4568879dc96e928e0536f873 May 17 00:37:54.096548 env[1373]: 2025-05-17 00:37:54.060 [INFO][3149] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.35.128/26 handle="k8s-pod-network.599c9dbe93c8280898e0fd1b4ce6e59c5ead335e4568879dc96e928e0536f873" host="10.200.4.22" May 17 00:37:54.096548 env[1373]: 2025-05-17 00:37:54.068 [INFO][3149] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.35.131/26] block=192.168.35.128/26 handle="k8s-pod-network.599c9dbe93c8280898e0fd1b4ce6e59c5ead335e4568879dc96e928e0536f873" host="10.200.4.22" May 17 00:37:54.096548 env[1373]: 2025-05-17 00:37:54.068 [INFO][3149] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.35.131/26] handle="k8s-pod-network.599c9dbe93c8280898e0fd1b4ce6e59c5ead335e4568879dc96e928e0536f873" host="10.200.4.22" May 17 00:37:54.096548 env[1373]: 2025-05-17 00:37:54.068 [INFO][3149] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:54.096548 env[1373]: 2025-05-17 00:37:54.068 [INFO][3149] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.35.131/26] IPv6=[] ContainerID="599c9dbe93c8280898e0fd1b4ce6e59c5ead335e4568879dc96e928e0536f873" HandleID="k8s-pod-network.599c9dbe93c8280898e0fd1b4ce6e59c5ead335e4568879dc96e928e0536f873" Workload="10.200.4.22-k8s-nfs--server--provisioner--0-eth0" May 17 00:37:54.097157 env[1373]: 2025-05-17 00:37:54.070 [INFO][3137] cni-plugin/k8s.go 418: Populated endpoint ContainerID="599c9dbe93c8280898e0fd1b4ce6e59c5ead335e4568879dc96e928e0536f873" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.4.22-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.22-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"5fa2ea5c-ff71-473d-a052-1277dec2bac5", ResourceVersion:"1535", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.22", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.35.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:37:54.097157 env[1373]: 2025-05-17 00:37:54.070 [INFO][3137] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.35.131/32] ContainerID="599c9dbe93c8280898e0fd1b4ce6e59c5ead335e4568879dc96e928e0536f873" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.4.22-k8s-nfs--server--provisioner--0-eth0" May 17 00:37:54.097157 env[1373]: 2025-05-17 00:37:54.070 [INFO][3137] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="599c9dbe93c8280898e0fd1b4ce6e59c5ead335e4568879dc96e928e0536f873" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.4.22-k8s-nfs--server--provisioner--0-eth0" May 17 00:37:54.097157 env[1373]: 2025-05-17 00:37:54.085 [INFO][3137] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="599c9dbe93c8280898e0fd1b4ce6e59c5ead335e4568879dc96e928e0536f873" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.4.22-k8s-nfs--server--provisioner--0-eth0" May 17 00:37:54.097347 env[1373]: 2025-05-17 00:37:54.085 [INFO][3137] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="599c9dbe93c8280898e0fd1b4ce6e59c5ead335e4568879dc96e928e0536f873" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.4.22-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.22-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"5fa2ea5c-ff71-473d-a052-1277dec2bac5", ResourceVersion:"1535", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.22", ContainerID:"599c9dbe93c8280898e0fd1b4ce6e59c5ead335e4568879dc96e928e0536f873", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.35.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"42:f2:30:2e:b9:54", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:37:54.097347 env[1373]: 2025-05-17 00:37:54.095 [INFO][3137] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="599c9dbe93c8280898e0fd1b4ce6e59c5ead335e4568879dc96e928e0536f873" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.4.22-k8s-nfs--server--provisioner--0-eth0" May 17 00:37:54.112000 audit[3171]: NETFILTER_CFG table=filter:82 family=2 entries=46 op=nft_register_chain pid=3171 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:37:54.112000 audit[3171]: SYSCALL arch=c000003e syscall=46 success=yes exit=23608 a0=3 a1=7fff4b0393e0 a2=0 a3=7fff4b0393cc items=0 ppid=2626 pid=3171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.112000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:37:54.117324 env[1373]: time="2025-05-17T00:37:54.117258542Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:37:54.117490 env[1373]: time="2025-05-17T00:37:54.117297042Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:37:54.117490 env[1373]: time="2025-05-17T00:37:54.117314643Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:37:54.117633 env[1373]: time="2025-05-17T00:37:54.117485445Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/599c9dbe93c8280898e0fd1b4ce6e59c5ead335e4568879dc96e928e0536f873 pid=3176 runtime=io.containerd.runc.v2 May 17 00:37:54.138371 systemd[1]: Started cri-containerd-599c9dbe93c8280898e0fd1b4ce6e59c5ead335e4568879dc96e928e0536f873.scope. May 17 00:37:54.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.152000 audit: BPF prog-id=113 op=LOAD May 17 00:37:54.153000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.153000 audit[3185]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3176 pid=3185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539396339646265393363383238303839386530666431623463653665 May 17 00:37:54.153000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.153000 audit[3185]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3176 pid=3185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539396339646265393363383238303839386530666431623463653665 May 17 00:37:54.153000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.153000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.153000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.153000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.153000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.153000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.153000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.153000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.153000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.153000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.153000 audit: BPF prog-id=114 op=LOAD May 17 00:37:54.153000 audit[3185]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001abc50 items=0 ppid=3176 pid=3185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539396339646265393363383238303839386530666431623463653665 May 17 00:37:54.153000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.153000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.153000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.153000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.153000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.153000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.153000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.153000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.153000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.153000 audit: BPF prog-id=115 op=LOAD May 17 00:37:54.153000 audit[3185]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001abc98 items=0 ppid=3176 pid=3185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539396339646265393363383238303839386530666431623463653665 May 17 00:37:54.153000 audit: BPF prog-id=115 op=UNLOAD May 17 00:37:54.153000 audit: BPF prog-id=114 op=UNLOAD May 17 00:37:54.153000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.153000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.153000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.153000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.153000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.153000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.153000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.153000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.153000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.153000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.153000 audit: BPF prog-id=116 op=LOAD May 17 00:37:54.153000 audit[3185]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003b00a8 items=0 ppid=3176 pid=3185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539396339646265393363383238303839386530666431623463653665 May 17 00:37:54.183513 env[1373]: time="2025-05-17T00:37:54.183479261Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:5fa2ea5c-ff71-473d-a052-1277dec2bac5,Namespace:default,Attempt:0,} returns sandbox id \"599c9dbe93c8280898e0fd1b4ce6e59c5ead335e4568879dc96e928e0536f873\"" May 17 00:37:54.185500 env[1373]: time="2025-05-17T00:37:54.185473183Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" May 17 00:37:54.480633 kubelet[1889]: E0517 00:37:54.480572 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:54.839325 systemd[1]: run-containerd-runc-k8s.io-599c9dbe93c8280898e0fd1b4ce6e59c5ead335e4568879dc96e928e0536f873-runc.KwPqiK.mount: Deactivated successfully. May 17 00:37:55.481373 kubelet[1889]: E0517 00:37:55.481311 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:56.028694 systemd-networkd[1526]: cali60e51b789ff: Gained IPv6LL May 17 00:37:56.482409 kubelet[1889]: E0517 00:37:56.482349 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:57.290349 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2896158796.mount: Deactivated successfully. May 17 00:37:57.482577 kubelet[1889]: E0517 00:37:57.482527 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:58.483200 kubelet[1889]: E0517 00:37:58.483121 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:59.318079 env[1373]: time="2025-05-17T00:37:59.318023574Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:59.328271 env[1373]: time="2025-05-17T00:37:59.328217273Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:59.336368 env[1373]: time="2025-05-17T00:37:59.336311652Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:59.341477 env[1373]: time="2025-05-17T00:37:59.341419602Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:59.342107 env[1373]: time="2025-05-17T00:37:59.342068808Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" May 17 00:37:59.350169 env[1373]: time="2025-05-17T00:37:59.350115887Z" level=info msg="CreateContainer within sandbox \"599c9dbe93c8280898e0fd1b4ce6e59c5ead335e4568879dc96e928e0536f873\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" May 17 00:37:59.387854 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2732474753.mount: Deactivated successfully. May 17 00:37:59.414873 env[1373]: time="2025-05-17T00:37:59.414814918Z" level=info msg="CreateContainer within sandbox \"599c9dbe93c8280898e0fd1b4ce6e59c5ead335e4568879dc96e928e0536f873\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"fe0ee9816f53e8ed93315a77e099aa806da880c83deaeeb094207cf8a5fc90f7\"" May 17 00:37:59.415710 env[1373]: time="2025-05-17T00:37:59.415674126Z" level=info msg="StartContainer for \"fe0ee9816f53e8ed93315a77e099aa806da880c83deaeeb094207cf8a5fc90f7\"" May 17 00:37:59.438543 systemd[1]: Started cri-containerd-fe0ee9816f53e8ed93315a77e099aa806da880c83deaeeb094207cf8a5fc90f7.scope. May 17 00:37:59.456436 kernel: kauditd_printk_skb: 62 callbacks suppressed May 17 00:37:59.456564 kernel: audit: type=1400 audit(1747442279.450:725): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.480984 kernel: audit: type=1400 audit(1747442279.450:726): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.481115 kernel: audit: type=1400 audit(1747442279.450:727): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.493095 kubelet[1889]: E0517 00:37:59.493056 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:59.493480 kernel: audit: type=1400 audit(1747442279.450:728): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.530124 kernel: audit: type=1400 audit(1747442279.450:729): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.530317 kernel: audit: type=1400 audit(1747442279.450:730): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.530345 kernel: audit: type=1400 audit(1747442279.450:731): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.571366 kernel: audit: type=1400 audit(1747442279.450:732): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.571509 kernel: audit: type=1400 audit(1747442279.450:733): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.584227 kernel: audit: type=1400 audit(1747442279.455:734): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.584850 env[1373]: time="2025-05-17T00:37:59.584804575Z" level=info msg="StartContainer for \"fe0ee9816f53e8ed93315a77e099aa806da880c83deaeeb094207cf8a5fc90f7\" returns successfully" May 17 00:37:59.455000 audit: BPF prog-id=117 op=LOAD May 17 00:37:59.455000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.455000 audit[3220]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3176 pid=3220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:59.455000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665306565393831366635336538656439333331356137376530393961 May 17 00:37:59.455000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.455000 audit[3220]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=3176 pid=3220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:59.455000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665306565393831366635336538656439333331356137376530393961 May 17 00:37:59.455000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.455000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.455000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.455000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.455000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.455000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.455000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.455000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.455000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.455000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.455000 audit: BPF prog-id=118 op=LOAD May 17 00:37:59.455000 audit[3220]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0002b7120 items=0 ppid=3176 pid=3220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:59.455000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665306565393831366635336538656439333331356137376530393961 May 17 00:37:59.467000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.467000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.467000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.467000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.467000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.467000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.467000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.467000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.467000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.467000 audit: BPF prog-id=119 op=LOAD May 17 00:37:59.467000 audit[3220]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0002b7168 items=0 ppid=3176 pid=3220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:59.467000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665306565393831366635336538656439333331356137376530393961 May 17 00:37:59.491000 audit: BPF prog-id=119 op=UNLOAD May 17 00:37:59.492000 audit: BPF prog-id=118 op=UNLOAD May 17 00:37:59.492000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.492000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.492000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.492000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.492000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.492000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.492000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.492000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.492000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.492000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.492000 audit: BPF prog-id=120 op=LOAD May 17 00:37:59.492000 audit[3220]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0002b7578 items=0 ppid=3176 pid=3220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:59.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665306565393831366635336538656439333331356137376530393961 May 17 00:37:59.608000 audit[3260]: AVC avc: denied { search } for pid=3260 comm="rpcbind" name="crypto" dev="proc" ino=26724 scontext=system_u:system_r:svirt_lxc_net_t:s0:c0,c321 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 17 00:37:59.608000 audit[3260]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f1100cbe0c0 a2=0 a3=0 items=0 ppid=3231 pid=3260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c0,c321 key=(null) May 17 00:37:59.608000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 May 17 00:37:59.675000 audit[3277]: AVC avc: denied { search } for pid=3277 comm="dbus-daemon" name="crypto" dev="proc" ino=26724 scontext=system_u:system_r:svirt_lxc_net_t:s0:c0,c321 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 17 00:37:59.675000 audit[3277]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f97f98d70c0 a2=0 a3=0 items=0 ppid=3231 pid=3277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c0,c321 key=(null) May 17 00:37:59.675000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 17 00:37:59.680000 audit[3279]: AVC avc: denied { watch } for pid=3279 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537521 scontext=system_u:system_r:svirt_lxc_net_t:s0:c0,c321 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c0,c321 tclass=dir permissive=0 May 17 00:37:59.680000 audit[3279]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55acf1e1eb50 a2=2c8 a3=7ffc0fa1aeac items=0 ppid=3231 pid=3279 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c0,c321 key=(null) May 17 00:37:59.680000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 17 00:37:59.686000 audit[3280]: AVC avc: denied { read } for pid=3280 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=26836 scontext=system_u:system_r:svirt_lxc_net_t:s0:c0,c321 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 May 17 00:37:59.686000 audit[3280]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7ff76ca81320 a1=80000 a2=d a3=7fffa03c1da0 items=0 ppid=3231 pid=3280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c0,c321 key=(null) May 17 00:37:59.686000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 17 00:37:59.688000 audit[3280]: AVC avc: denied { search } for pid=3280 comm="ganesha.nfsd" name="crypto" dev="proc" ino=26724 scontext=system_u:system_r:svirt_lxc_net_t:s0:c0,c321 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 17 00:37:59.688000 audit[3280]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7ff76bfd50c0 a2=0 a3=0 items=0 ppid=3231 pid=3280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c0,c321 key=(null) May 17 00:37:59.688000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 17 00:37:59.695000 audit[3281]: NETFILTER_CFG table=filter:83 family=2 entries=24 op=nft_register_rule pid=3281 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:59.695000 audit[3281]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffebea51100 a2=0 a3=7ffebea510ec items=0 ppid=2066 pid=3281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:59.695000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:59.701000 audit[3281]: NETFILTER_CFG table=nat:84 family=2 entries=106 op=nft_register_chain pid=3281 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:59.701000 audit[3281]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffebea51100 a2=0 a3=7ffebea510ec items=0 ppid=2066 pid=3281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:59.701000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:59.741548 kubelet[1889]: I0517 00:37:59.741486 1889 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.582726156 podStartE2EDuration="6.741466703s" podCreationTimestamp="2025-05-17 00:37:53 +0000 UTC" firstStartedPulling="2025-05-17 00:37:54.184837276 +0000 UTC m=+52.649894485" lastFinishedPulling="2025-05-17 00:37:59.343577923 +0000 UTC m=+57.808635032" observedRunningTime="2025-05-17 00:37:59.66221923 +0000 UTC m=+58.127276339" watchObservedRunningTime="2025-05-17 00:37:59.741466703 +0000 UTC m=+58.206523812" May 17 00:38:00.493993 kubelet[1889]: E0517 00:38:00.493937 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:01.494457 kubelet[1889]: E0517 00:38:01.494394 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:02.434974 kubelet[1889]: E0517 00:38:02.434923 1889 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:02.474525 env[1373]: time="2025-05-17T00:38:02.474481588Z" level=info msg="StopPodSandbox for \"b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae\"" May 17 00:38:02.494752 kubelet[1889]: E0517 00:38:02.494696 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:02.549232 env[1373]: 2025-05-17 00:38:02.512 [WARNING][3293] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.22-k8s-nginx--deployment--7fcdb87857--zt87t-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"4ba22c34-84c6-4a75-9e17-9038b998708b", ResourceVersion:"1490", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.22", ContainerID:"f4c21a90da3cfea07a0a1ca4867991f6283a047e0ad96f24e0961a82e1f6cb51", Pod:"nginx-deployment-7fcdb87857-zt87t", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.35.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali6f62d572bd6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:38:02.549232 env[1373]: 2025-05-17 00:38:02.513 [INFO][3293] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae" May 17 00:38:02.549232 env[1373]: 2025-05-17 00:38:02.513 [INFO][3293] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae" iface="eth0" netns="" May 17 00:38:02.549232 env[1373]: 2025-05-17 00:38:02.513 [INFO][3293] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae" May 17 00:38:02.549232 env[1373]: 2025-05-17 00:38:02.513 [INFO][3293] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae" May 17 00:38:02.549232 env[1373]: 2025-05-17 00:38:02.538 [INFO][3300] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae" HandleID="k8s-pod-network.b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae" Workload="10.200.4.22-k8s-nginx--deployment--7fcdb87857--zt87t-eth0" May 17 00:38:02.549232 env[1373]: 2025-05-17 00:38:02.538 [INFO][3300] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:02.549232 env[1373]: 2025-05-17 00:38:02.538 [INFO][3300] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:02.549232 env[1373]: 2025-05-17 00:38:02.545 [WARNING][3300] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae" HandleID="k8s-pod-network.b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae" Workload="10.200.4.22-k8s-nginx--deployment--7fcdb87857--zt87t-eth0" May 17 00:38:02.549232 env[1373]: 2025-05-17 00:38:02.546 [INFO][3300] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae" HandleID="k8s-pod-network.b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae" Workload="10.200.4.22-k8s-nginx--deployment--7fcdb87857--zt87t-eth0" May 17 00:38:02.549232 env[1373]: 2025-05-17 00:38:02.547 [INFO][3300] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:02.549232 env[1373]: 2025-05-17 00:38:02.548 [INFO][3293] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae" May 17 00:38:02.549736 env[1373]: time="2025-05-17T00:38:02.549263774Z" level=info msg="TearDown network for sandbox \"b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae\" successfully" May 17 00:38:02.549736 env[1373]: time="2025-05-17T00:38:02.549303774Z" level=info msg="StopPodSandbox for \"b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae\" returns successfully" May 17 00:38:02.550384 env[1373]: time="2025-05-17T00:38:02.550351684Z" level=info msg="RemovePodSandbox for \"b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae\"" May 17 00:38:02.550646 env[1373]: time="2025-05-17T00:38:02.550558885Z" level=info msg="Forcibly stopping sandbox \"b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae\"" May 17 00:38:02.632865 env[1373]: 2025-05-17 00:38:02.588 [WARNING][3318] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.22-k8s-nginx--deployment--7fcdb87857--zt87t-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"4ba22c34-84c6-4a75-9e17-9038b998708b", ResourceVersion:"1490", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.22", ContainerID:"f4c21a90da3cfea07a0a1ca4867991f6283a047e0ad96f24e0961a82e1f6cb51", Pod:"nginx-deployment-7fcdb87857-zt87t", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.35.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali6f62d572bd6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:38:02.632865 env[1373]: 2025-05-17 00:38:02.589 [INFO][3318] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae" May 17 00:38:02.632865 env[1373]: 2025-05-17 00:38:02.589 [INFO][3318] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae" iface="eth0" netns="" May 17 00:38:02.632865 env[1373]: 2025-05-17 00:38:02.589 [INFO][3318] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae" May 17 00:38:02.632865 env[1373]: 2025-05-17 00:38:02.589 [INFO][3318] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae" May 17 00:38:02.632865 env[1373]: 2025-05-17 00:38:02.621 [INFO][3325] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae" HandleID="k8s-pod-network.b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae" Workload="10.200.4.22-k8s-nginx--deployment--7fcdb87857--zt87t-eth0" May 17 00:38:02.632865 env[1373]: 2025-05-17 00:38:02.621 [INFO][3325] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:02.632865 env[1373]: 2025-05-17 00:38:02.621 [INFO][3325] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:02.632865 env[1373]: 2025-05-17 00:38:02.628 [WARNING][3325] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae" HandleID="k8s-pod-network.b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae" Workload="10.200.4.22-k8s-nginx--deployment--7fcdb87857--zt87t-eth0" May 17 00:38:02.632865 env[1373]: 2025-05-17 00:38:02.628 [INFO][3325] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae" HandleID="k8s-pod-network.b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae" Workload="10.200.4.22-k8s-nginx--deployment--7fcdb87857--zt87t-eth0" May 17 00:38:02.632865 env[1373]: 2025-05-17 00:38:02.630 [INFO][3325] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:02.632865 env[1373]: 2025-05-17 00:38:02.631 [INFO][3318] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae" May 17 00:38:02.632865 env[1373]: time="2025-05-17T00:38:02.632849940Z" level=info msg="TearDown network for sandbox \"b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae\" successfully" May 17 00:38:02.647818 env[1373]: time="2025-05-17T00:38:02.647754677Z" level=info msg="RemovePodSandbox \"b376871910faae56d6e4c738650a917240abe4272d1851f8b7f1ab90056645ae\" returns successfully" May 17 00:38:02.648392 env[1373]: time="2025-05-17T00:38:02.648359182Z" level=info msg="StopPodSandbox for \"4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271\"" May 17 00:38:02.737552 env[1373]: 2025-05-17 00:38:02.696 [WARNING][3341] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.22-k8s-csi--node--driver--mjvqz-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4c0874f4-3d52-4bc3-91d1-2863ef2820cc", ResourceVersion:"1466", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.22", ContainerID:"aa4676902eb769ce36711c10eaa99cd862190e57199ef5ffd404b30133605c7c", Pod:"csi-node-driver-mjvqz", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.35.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali17c591de095", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:38:02.737552 env[1373]: 2025-05-17 00:38:02.697 [INFO][3341] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271" May 17 00:38:02.737552 env[1373]: 2025-05-17 00:38:02.697 [INFO][3341] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271" iface="eth0" netns="" May 17 00:38:02.737552 env[1373]: 2025-05-17 00:38:02.697 [INFO][3341] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271" May 17 00:38:02.737552 env[1373]: 2025-05-17 00:38:02.697 [INFO][3341] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271" May 17 00:38:02.737552 env[1373]: 2025-05-17 00:38:02.719 [INFO][3348] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271" HandleID="k8s-pod-network.4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271" Workload="10.200.4.22-k8s-csi--node--driver--mjvqz-eth0" May 17 00:38:02.737552 env[1373]: 2025-05-17 00:38:02.719 [INFO][3348] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:02.737552 env[1373]: 2025-05-17 00:38:02.719 [INFO][3348] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:02.737552 env[1373]: 2025-05-17 00:38:02.733 [WARNING][3348] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271" HandleID="k8s-pod-network.4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271" Workload="10.200.4.22-k8s-csi--node--driver--mjvqz-eth0" May 17 00:38:02.737552 env[1373]: 2025-05-17 00:38:02.733 [INFO][3348] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271" HandleID="k8s-pod-network.4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271" Workload="10.200.4.22-k8s-csi--node--driver--mjvqz-eth0" May 17 00:38:02.737552 env[1373]: 2025-05-17 00:38:02.735 [INFO][3348] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:02.737552 env[1373]: 2025-05-17 00:38:02.736 [INFO][3341] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271" May 17 00:38:02.738316 env[1373]: time="2025-05-17T00:38:02.737592301Z" level=info msg="TearDown network for sandbox \"4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271\" successfully" May 17 00:38:02.738316 env[1373]: time="2025-05-17T00:38:02.737636801Z" level=info msg="StopPodSandbox for \"4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271\" returns successfully" May 17 00:38:02.738316 env[1373]: time="2025-05-17T00:38:02.738239207Z" level=info msg="RemovePodSandbox for \"4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271\"" May 17 00:38:02.738316 env[1373]: time="2025-05-17T00:38:02.738280907Z" level=info msg="Forcibly stopping sandbox \"4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271\"" May 17 00:38:02.829838 env[1373]: 2025-05-17 00:38:02.792 [WARNING][3363] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.22-k8s-csi--node--driver--mjvqz-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4c0874f4-3d52-4bc3-91d1-2863ef2820cc", ResourceVersion:"1466", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.22", ContainerID:"aa4676902eb769ce36711c10eaa99cd862190e57199ef5ffd404b30133605c7c", Pod:"csi-node-driver-mjvqz", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.35.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali17c591de095", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:38:02.829838 env[1373]: 2025-05-17 00:38:02.794 [INFO][3363] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271" May 17 00:38:02.829838 env[1373]: 2025-05-17 00:38:02.794 [INFO][3363] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271" iface="eth0" netns="" May 17 00:38:02.829838 env[1373]: 2025-05-17 00:38:02.794 [INFO][3363] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271" May 17 00:38:02.829838 env[1373]: 2025-05-17 00:38:02.794 [INFO][3363] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271" May 17 00:38:02.829838 env[1373]: 2025-05-17 00:38:02.817 [INFO][3370] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271" HandleID="k8s-pod-network.4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271" Workload="10.200.4.22-k8s-csi--node--driver--mjvqz-eth0" May 17 00:38:02.829838 env[1373]: 2025-05-17 00:38:02.817 [INFO][3370] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:02.829838 env[1373]: 2025-05-17 00:38:02.818 [INFO][3370] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:02.829838 env[1373]: 2025-05-17 00:38:02.825 [WARNING][3370] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271" HandleID="k8s-pod-network.4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271" Workload="10.200.4.22-k8s-csi--node--driver--mjvqz-eth0" May 17 00:38:02.829838 env[1373]: 2025-05-17 00:38:02.826 [INFO][3370] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271" HandleID="k8s-pod-network.4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271" Workload="10.200.4.22-k8s-csi--node--driver--mjvqz-eth0" May 17 00:38:02.829838 env[1373]: 2025-05-17 00:38:02.827 [INFO][3370] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:02.829838 env[1373]: 2025-05-17 00:38:02.828 [INFO][3363] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271" May 17 00:38:02.830539 env[1373]: time="2025-05-17T00:38:02.829874247Z" level=info msg="TearDown network for sandbox \"4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271\" successfully" May 17 00:38:02.840225 env[1373]: time="2025-05-17T00:38:02.840175741Z" level=info msg="RemovePodSandbox \"4ce53c980077af804022d979fc850355065799e5183a3fa80858296e471a4271\" returns successfully" May 17 00:38:03.495405 kubelet[1889]: E0517 00:38:03.495353 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:04.495663 kubelet[1889]: E0517 00:38:04.495608 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:05.496636 kubelet[1889]: E0517 00:38:05.496577 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:06.497034 kubelet[1889]: E0517 00:38:06.496975 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:07.497613 kubelet[1889]: E0517 00:38:07.497559 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:08.498117 kubelet[1889]: E0517 00:38:08.498058 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:09.498438 kubelet[1889]: E0517 00:38:09.498386 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:10.499446 kubelet[1889]: E0517 00:38:10.499388 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:11.499749 kubelet[1889]: E0517 00:38:11.499692 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:12.500468 kubelet[1889]: E0517 00:38:12.500407 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:13.500822 kubelet[1889]: E0517 00:38:13.500757 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:14.501322 kubelet[1889]: E0517 00:38:14.501261 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:15.502050 kubelet[1889]: E0517 00:38:15.501993 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:16.503172 kubelet[1889]: E0517 00:38:16.503100 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:17.504818 kubelet[1889]: E0517 00:38:17.504764 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:18.505534 kubelet[1889]: E0517 00:38:18.505499 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:19.505864 kubelet[1889]: E0517 00:38:19.505805 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:19.875718 systemd[1]: Created slice kubepods-besteffort-pod9881c12b_db69_443f_8ba2_5576f26191e7.slice. May 17 00:38:19.991897 kubelet[1889]: I0517 00:38:19.991850 1889 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-f8f79937-bcee-4222-80f9-859691b3eee8\" (UniqueName: \"kubernetes.io/nfs/9881c12b-db69-443f-8ba2-5576f26191e7-pvc-f8f79937-bcee-4222-80f9-859691b3eee8\") pod \"test-pod-1\" (UID: \"9881c12b-db69-443f-8ba2-5576f26191e7\") " pod="default/test-pod-1" May 17 00:38:19.992254 kubelet[1889]: I0517 00:38:19.992221 1889 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-x995n\" (UniqueName: \"kubernetes.io/projected/9881c12b-db69-443f-8ba2-5576f26191e7-kube-api-access-x995n\") pod \"test-pod-1\" (UID: \"9881c12b-db69-443f-8ba2-5576f26191e7\") " pod="default/test-pod-1" May 17 00:38:20.294555 kernel: Failed to create system directory netfs May 17 00:38:20.294707 kernel: kauditd_printk_skb: 68 callbacks suppressed May 17 00:38:20.294738 kernel: audit: type=1400 audit(1747442300.283:750): avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.294762 kernel: Failed to create system directory netfs May 17 00:38:20.283000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.312676 kernel: audit: type=1400 audit(1747442300.283:750): avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.312904 kernel: Failed to create system directory netfs May 17 00:38:20.283000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.330492 kernel: audit: type=1400 audit(1747442300.283:750): avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.330593 kernel: Failed to create system directory netfs May 17 00:38:20.283000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.348787 kernel: audit: type=1400 audit(1747442300.283:750): avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.283000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.283000 audit[3405]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56542fb235e0 a1=153bc a2=565418ff12b0 a3=5 items=0 ppid=55 pid=3405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:20.283000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 17 00:38:20.380163 kernel: audit: type=1300 audit(1747442300.283:750): arch=c000003e syscall=175 success=yes exit=0 a0=56542fb235e0 a1=153bc a2=565418ff12b0 a3=5 items=0 ppid=55 pid=3405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:20.380217 kernel: audit: type=1327 audit(1747442300.283:750): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 17 00:38:20.444306 kernel: Failed to create system directory fscache May 17 00:38:20.444447 kernel: audit: type=1400 audit(1747442300.421:751): avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.444469 kernel: Failed to create system directory fscache May 17 00:38:20.421000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.462220 kernel: audit: type=1400 audit(1747442300.421:751): avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.462365 kernel: Failed to create system directory fscache May 17 00:38:20.421000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.484255 kernel: audit: type=1400 audit(1747442300.421:751): avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.484405 kernel: Failed to create system directory fscache May 17 00:38:20.484438 kernel: audit: type=1400 audit(1747442300.421:751): avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.421000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.421000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.498879 kernel: Failed to create system directory fscache May 17 00:38:20.421000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.421000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.505265 kernel: Failed to create system directory fscache May 17 00:38:20.505338 kernel: Failed to create system directory fscache May 17 00:38:20.421000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.506506 kubelet[1889]: E0517 00:38:20.506486 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:20.421000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.511638 kernel: Failed to create system directory fscache May 17 00:38:20.421000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.514818 kernel: Failed to create system directory fscache May 17 00:38:20.514894 kernel: Failed to create system directory fscache May 17 00:38:20.421000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.421000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.520923 kernel: Failed to create system directory fscache May 17 00:38:20.520985 kernel: Failed to create system directory fscache May 17 00:38:20.421000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.421000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.526844 kernel: Failed to create system directory fscache May 17 00:38:20.526905 kernel: Failed to create system directory fscache May 17 00:38:20.421000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.421000 audit[3405]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56542fd389c0 a1=4c0fc a2=565418ff12b0 a3=5 items=0 ppid=55 pid=3405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:20.421000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 17 00:38:20.534162 kernel: FS-Cache: Loaded May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.744100 kernel: Failed to create system directory sunrpc May 17 00:38:20.744216 kernel: Failed to create system directory sunrpc May 17 00:38:20.744240 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.747164 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.753224 kernel: Failed to create system directory sunrpc May 17 00:38:20.753320 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.758856 kernel: Failed to create system directory sunrpc May 17 00:38:20.758920 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.764851 kernel: Failed to create system directory sunrpc May 17 00:38:20.764918 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.771945 kernel: Failed to create system directory sunrpc May 17 00:38:20.772024 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.780474 kernel: Failed to create system directory sunrpc May 17 00:38:20.780566 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.788261 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.792517 kernel: Failed to create system directory sunrpc May 17 00:38:20.792603 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.799840 kernel: Failed to create system directory sunrpc May 17 00:38:20.800996 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.807603 kernel: Failed to create system directory sunrpc May 17 00:38:20.807671 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.814901 kernel: Failed to create system directory sunrpc May 17 00:38:20.815909 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.822939 kernel: Failed to create system directory sunrpc May 17 00:38:20.823037 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.826525 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.830592 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.834249 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.841261 kernel: Failed to create system directory sunrpc May 17 00:38:20.841373 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.849063 kernel: Failed to create system directory sunrpc May 17 00:38:20.849111 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.856194 kernel: Failed to create system directory sunrpc May 17 00:38:20.856266 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.863531 kernel: Failed to create system directory sunrpc May 17 00:38:20.863589 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.866301 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.869656 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.872863 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.879398 kernel: Failed to create system directory sunrpc May 17 00:38:20.879462 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.885864 kernel: Failed to create system directory sunrpc May 17 00:38:20.885926 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.892519 kernel: Failed to create system directory sunrpc May 17 00:38:20.896658 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.898203 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.903203 kernel: Failed to create system directory sunrpc May 17 00:38:20.903254 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.910897 kernel: Failed to create system directory sunrpc May 17 00:38:20.911688 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.913169 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.919771 kernel: Failed to create system directory sunrpc May 17 00:38:20.919829 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.927547 kernel: Failed to create system directory sunrpc May 17 00:38:20.928259 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.932860 kernel: Failed to create system directory sunrpc May 17 00:38:20.932899 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.940626 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.946604 kernel: Failed to create system directory sunrpc May 17 00:38:20.947499 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.953303 kernel: Failed to create system directory sunrpc May 17 00:38:20.953395 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.960594 kernel: Failed to create system directory sunrpc May 17 00:38:20.960675 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.967639 kernel: Failed to create system directory sunrpc May 17 00:38:20.967715 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.974501 kernel: Failed to create system directory sunrpc May 17 00:38:20.974585 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.981125 kernel: Failed to create system directory sunrpc May 17 00:38:20.981657 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.988666 kernel: Failed to create system directory sunrpc May 17 00:38:20.988737 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.993951 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.997546 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.009161 kernel: Failed to create system directory sunrpc May 17 00:38:21.009240 kernel: Failed to create system directory sunrpc May 17 00:38:21.009272 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.013598 kernel: Failed to create system directory sunrpc May 17 00:38:21.013659 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.018980 kernel: Failed to create system directory sunrpc May 17 00:38:21.019033 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.025030 kernel: Failed to create system directory sunrpc May 17 00:38:21.025129 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.029725 kernel: Failed to create system directory sunrpc May 17 00:38:21.029789 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.032364 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.038751 kernel: Failed to create system directory sunrpc May 17 00:38:21.038826 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.042039 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.048777 kernel: Failed to create system directory sunrpc May 17 00:38:21.049583 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.052687 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.058986 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.067466 kernel: Failed to create system directory sunrpc May 17 00:38:21.067542 kernel: Failed to create system directory sunrpc May 17 00:38:21.067561 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.074938 kernel: Failed to create system directory sunrpc May 17 00:38:21.074998 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.085187 kernel: Failed to create system directory sunrpc May 17 00:38:21.085266 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.092067 kernel: Failed to create system directory sunrpc May 17 00:38:21.092131 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.100351 kernel: Failed to create system directory sunrpc May 17 00:38:21.100427 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.106530 kernel: Failed to create system directory sunrpc May 17 00:38:21.106617 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.108909 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.112227 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.116686 kernel: Failed to create system directory sunrpc May 17 00:38:21.116750 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.121209 kernel: Failed to create system directory sunrpc May 17 00:38:21.121250 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.125654 kernel: Failed to create system directory sunrpc May 17 00:38:21.125707 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.130448 kernel: Failed to create system directory sunrpc May 17 00:38:21.130499 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.135042 kernel: Failed to create system directory sunrpc May 17 00:38:21.135086 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.139670 kernel: Failed to create system directory sunrpc May 17 00:38:21.139726 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.144356 kernel: Failed to create system directory sunrpc May 17 00:38:21.144408 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.148874 kernel: Failed to create system directory sunrpc May 17 00:38:21.148992 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.153372 kernel: Failed to create system directory sunrpc May 17 00:38:21.153435 kernel: Failed to create system directory sunrpc May 17 00:38:20.723000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.168113 kernel: RPC: Registered named UNIX socket transport module. May 17 00:38:21.168233 kernel: RPC: Registered udp transport module. May 17 00:38:21.168262 kernel: RPC: Registered tcp transport module. May 17 00:38:21.170193 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. May 17 00:38:20.723000 audit[3405]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56542fd84ad0 a1=1a814c a2=565418ff12b0 a3=5 items=6 ppid=55 pid=3405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:20.723000 audit: CWD cwd="/" May 17 00:38:20.723000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:38:20.723000 audit: PATH item=1 name=(null) inode=27022 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:38:20.723000 audit: PATH item=2 name=(null) inode=27022 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:38:20.723000 audit: PATH item=3 name=(null) inode=27023 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:38:20.723000 audit: PATH item=4 name=(null) inode=27022 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:38:20.723000 audit: PATH item=5 name=(null) inode=27024 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:38:20.723000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.425449 kernel: Failed to create system directory nfs May 17 00:38:21.425549 kernel: Failed to create system directory nfs May 17 00:38:21.425579 kernel: Failed to create system directory nfs May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.430382 kernel: Failed to create system directory nfs May 17 00:38:21.430526 kernel: Failed to create system directory nfs May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.435111 kernel: Failed to create system directory nfs May 17 00:38:21.435187 kernel: Failed to create system directory nfs May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.438200 kernel: Failed to create system directory nfs May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.442020 kernel: Failed to create system directory nfs May 17 00:38:21.442071 kernel: Failed to create system directory nfs May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.446667 kernel: Failed to create system directory nfs May 17 00:38:21.446723 kernel: Failed to create system directory nfs May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.449009 kernel: Failed to create system directory nfs May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.453713 kernel: Failed to create system directory nfs May 17 00:38:21.453756 kernel: Failed to create system directory nfs May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.458013 kernel: Failed to create system directory nfs May 17 00:38:21.458054 kernel: Failed to create system directory nfs May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.462521 kernel: Failed to create system directory nfs May 17 00:38:21.462574 kernel: Failed to create system directory nfs May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.466882 kernel: Failed to create system directory nfs May 17 00:38:21.466934 kernel: Failed to create system directory nfs May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.471698 kernel: Failed to create system directory nfs May 17 00:38:21.471754 kernel: Failed to create system directory nfs May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.476178 kernel: Failed to create system directory nfs May 17 00:38:21.476223 kernel: Failed to create system directory nfs May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.480781 kernel: Failed to create system directory nfs May 17 00:38:21.480830 kernel: Failed to create system directory nfs May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.485260 kernel: Failed to create system directory nfs May 17 00:38:21.485319 kernel: Failed to create system directory nfs May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.489672 kernel: Failed to create system directory nfs May 17 00:38:21.489730 kernel: Failed to create system directory nfs May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.494183 kernel: Failed to create system directory nfs May 17 00:38:21.494233 kernel: Failed to create system directory nfs May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.498511 kernel: Failed to create system directory nfs May 17 00:38:21.498569 kernel: Failed to create system directory nfs May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.501199 kernel: Failed to create system directory nfs May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.505312 kernel: Failed to create system directory nfs May 17 00:38:21.505354 kernel: Failed to create system directory nfs May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.507491 kubelet[1889]: E0517 00:38:21.507432 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:21.507961 kernel: Failed to create system directory nfs May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.509974 kernel: Failed to create system directory nfs May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.514568 kernel: Failed to create system directory nfs May 17 00:38:21.514635 kernel: Failed to create system directory nfs May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.516739 kernel: Failed to create system directory nfs May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.522349 kernel: Failed to create system directory nfs May 17 00:38:21.522416 kernel: Failed to create system directory nfs May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.526977 kernel: Failed to create system directory nfs May 17 00:38:21.527044 kernel: Failed to create system directory nfs May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.531442 kernel: Failed to create system directory nfs May 17 00:38:21.531492 kernel: Failed to create system directory nfs May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.536453 kernel: Failed to create system directory nfs May 17 00:38:21.536522 kernel: Failed to create system directory nfs May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.541073 kernel: Failed to create system directory nfs May 17 00:38:21.541162 kernel: Failed to create system directory nfs May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.545695 kernel: Failed to create system directory nfs May 17 00:38:21.545751 kernel: Failed to create system directory nfs May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.550457 kernel: Failed to create system directory nfs May 17 00:38:21.550500 kernel: Failed to create system directory nfs May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.555192 kernel: Failed to create system directory nfs May 17 00:38:21.555267 kernel: Failed to create system directory nfs May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.407000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.559806 kernel: Failed to create system directory nfs May 17 00:38:21.407000 audit[3405]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56542ffa5a10 a1=16eae4 a2=565418ff12b0 a3=5 items=0 ppid=55 pid=3405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:21.407000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 17 00:38:21.582165 kernel: FS-Cache: Netfs 'nfs' registered for caching May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.662891 kernel: Failed to create system directory nfs4 May 17 00:38:21.662973 kernel: Failed to create system directory nfs4 May 17 00:38:21.662993 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.667962 kernel: Failed to create system directory nfs4 May 17 00:38:21.668009 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.672310 kernel: Failed to create system directory nfs4 May 17 00:38:21.672359 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.677456 kernel: Failed to create system directory nfs4 May 17 00:38:21.677539 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.683803 kernel: Failed to create system directory nfs4 May 17 00:38:21.683869 kernel: Failed to create system directory nfs4 May 17 00:38:21.683902 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.688103 kernel: Failed to create system directory nfs4 May 17 00:38:21.688169 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.693856 kernel: Failed to create system directory nfs4 May 17 00:38:21.693942 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.697116 kernel: Failed to create system directory nfs4 May 17 00:38:21.697193 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.699315 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.701475 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.703686 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.706029 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.708255 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.710743 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.713240 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.715542 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.717911 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.720242 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.722523 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.725413 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.730161 kernel: Failed to create system directory nfs4 May 17 00:38:21.730216 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.732541 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.734839 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.737073 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.739291 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.741569 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.743950 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.746210 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.750560 kernel: Failed to create system directory nfs4 May 17 00:38:21.750611 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.752683 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.755748 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.759852 kernel: Failed to create system directory nfs4 May 17 00:38:21.759912 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.762664 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.766466 kernel: Failed to create system directory nfs4 May 17 00:38:21.766533 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.768974 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.772295 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.775798 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.779101 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.781508 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.783903 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.786333 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.788726 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.791290 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.793510 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.795739 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.798069 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.800368 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.802569 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.804773 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.807308 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.809447 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.811709 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.814200 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.818805 kernel: Failed to create system directory nfs4 May 17 00:38:21.818875 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.823984 kernel: Failed to create system directory nfs4 May 17 00:38:21.824067 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.828026 kernel: Failed to create system directory nfs4 May 17 00:38:21.828074 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.834233 kernel: Failed to create system directory nfs4 May 17 00:38:21.834314 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.841059 kernel: Failed to create system directory nfs4 May 17 00:38:21.841110 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.850367 kernel: Failed to create system directory nfs4 May 17 00:38:21.850414 kernel: Failed to create system directory nfs4 May 17 00:38:21.850442 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.856873 kernel: Failed to create system directory nfs4 May 17 00:38:21.856954 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.859965 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.863757 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.873526 kernel: Failed to create system directory nfs4 May 17 00:38:21.873591 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.875055 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.877779 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.882404 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.890241 kernel: Failed to create system directory nfs4 May 17 00:38:21.890332 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.896673 kernel: Failed to create system directory nfs4 May 17 00:38:21.896991 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:21.900086 kernel: Failed to create system directory nfs4 May 17 00:38:21.641000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:22.055982 kernel: NFS: Registering the id_resolver key type May 17 00:38:22.056130 kernel: Key type id_resolver registered May 17 00:38:22.056185 kernel: Key type id_legacy registered May 17 00:38:21.641000 audit[3410]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f293c915010 a1=209404 a2=56071f6962b0 a3=5 items=0 ppid=55 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:21.641000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 May 17 00:38:22.141000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:22.141000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:22.151602 kernel: Failed to create system directory rpcgss May 17 00:38:22.151696 kernel: Failed to create system directory rpcgss May 17 00:38:22.151731 kernel: Failed to create system directory rpcgss May 17 00:38:22.141000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:22.141000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:22.156566 kernel: Failed to create system directory rpcgss May 17 00:38:22.156664 kernel: Failed to create system directory rpcgss May 17 00:38:22.141000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:22.141000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:22.161339 kernel: Failed to create system directory rpcgss May 17 00:38:22.161401 kernel: Failed to create system directory rpcgss May 17 00:38:22.141000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:22.141000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:22.166040 kernel: Failed to create system directory rpcgss May 17 00:38:22.166101 kernel: Failed to create system directory rpcgss May 17 00:38:22.141000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:22.141000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:22.170908 kernel: Failed to create system directory rpcgss May 17 00:38:22.171033 kernel: Failed to create system directory rpcgss May 17 00:38:22.141000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:22.141000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:22.175610 kernel: Failed to create system directory rpcgss May 17 00:38:22.175667 kernel: Failed to create system directory rpcgss May 17 00:38:22.141000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:22.141000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:22.180206 kernel: Failed to create system directory rpcgss May 17 00:38:22.180260 kernel: Failed to create system directory rpcgss May 17 00:38:22.141000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:22.141000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:22.184821 kernel: Failed to create system directory rpcgss May 17 00:38:22.184888 kernel: Failed to create system directory rpcgss May 17 00:38:22.141000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:22.141000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:22.189567 kernel: Failed to create system directory rpcgss May 17 00:38:22.189618 kernel: Failed to create system directory rpcgss May 17 00:38:22.141000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:22.141000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:22.194218 kernel: Failed to create system directory rpcgss May 17 00:38:22.194294 kernel: Failed to create system directory rpcgss May 17 00:38:22.141000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:22.141000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:22.198971 kernel: Failed to create system directory rpcgss May 17 00:38:22.199689 kernel: Failed to create system directory rpcgss May 17 00:38:22.141000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:22.141000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:22.203919 kernel: Failed to create system directory rpcgss May 17 00:38:22.204009 kernel: Failed to create system directory rpcgss May 17 00:38:22.141000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:22.206240 kernel: Failed to create system directory rpcgss May 17 00:38:22.141000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:22.141000 audit[3411]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f18cc135010 a1=70b64 a2=5589571872b0 a3=5 items=0 ppid=55 pid=3411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:22.141000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 May 17 00:38:22.435379 kubelet[1889]: E0517 00:38:22.435257 1889 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:22.508222 kubelet[1889]: E0517 00:38:22.508189 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:22.558629 nfsidmap[3421]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.7-n-a14653f0ea' May 17 00:38:22.569432 nfsidmap[3422]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.7-n-a14653f0ea' May 17 00:38:22.579000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2729 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:38:22.579000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2729 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:38:22.579000 audit[1485]: AVC avc: denied { watch_reads } for pid=1485 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2729 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:38:22.579000 audit[1485]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=557322bc3270 a2=10 a3=faa900db6a7e55e7 items=0 ppid=1 pid=1485 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:22.579000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 17 00:38:22.579000 audit[1485]: AVC avc: denied { watch_reads } for pid=1485 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2729 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:38:22.579000 audit[1485]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=557322bc3270 a2=10 a3=faa900db6a7e55e7 items=0 ppid=1 pid=1485 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:22.579000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 17 00:38:22.579000 audit[1485]: AVC avc: denied { watch_reads } for pid=1485 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2729 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:38:22.579000 audit[1485]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=557322bc3270 a2=10 a3=faa900db6a7e55e7 items=0 ppid=1 pid=1485 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:22.579000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 17 00:38:22.879304 env[1373]: time="2025-05-17T00:38:22.879248113Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:9881c12b-db69-443f-8ba2-5576f26191e7,Namespace:default,Attempt:0,}" May 17 00:38:23.040870 systemd-networkd[1526]: cali5ec59c6bf6e: Link UP May 17 00:38:23.045200 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:38:23.045292 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready May 17 00:38:23.051560 systemd-networkd[1526]: cali5ec59c6bf6e: Gained carrier May 17 00:38:23.075115 env[1373]: 2025-05-17 00:38:22.972 [INFO][3423] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.4.22-k8s-test--pod--1-eth0 default 9881c12b-db69-443f-8ba2-5576f26191e7 1641 0 2025-05-17 00:37:54 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.4.22 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="ebb7bd79b8ce785c515462a90227fc7236c7b423cf6e2571a3d891413f7f51fa" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.4.22-k8s-test--pod--1-" May 17 00:38:23.075115 env[1373]: 2025-05-17 00:38:22.972 [INFO][3423] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="ebb7bd79b8ce785c515462a90227fc7236c7b423cf6e2571a3d891413f7f51fa" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.4.22-k8s-test--pod--1-eth0" May 17 00:38:23.075115 env[1373]: 2025-05-17 00:38:22.994 [INFO][3435] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ebb7bd79b8ce785c515462a90227fc7236c7b423cf6e2571a3d891413f7f51fa" HandleID="k8s-pod-network.ebb7bd79b8ce785c515462a90227fc7236c7b423cf6e2571a3d891413f7f51fa" Workload="10.200.4.22-k8s-test--pod--1-eth0" May 17 00:38:23.075115 env[1373]: 2025-05-17 00:38:22.994 [INFO][3435] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="ebb7bd79b8ce785c515462a90227fc7236c7b423cf6e2571a3d891413f7f51fa" HandleID="k8s-pod-network.ebb7bd79b8ce785c515462a90227fc7236c7b423cf6e2571a3d891413f7f51fa" Workload="10.200.4.22-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002c9150), Attrs:map[string]string{"namespace":"default", "node":"10.200.4.22", "pod":"test-pod-1", "timestamp":"2025-05-17 00:38:22.994080951 +0000 UTC"}, Hostname:"10.200.4.22", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:38:23.075115 env[1373]: 2025-05-17 00:38:22.994 [INFO][3435] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:23.075115 env[1373]: 2025-05-17 00:38:22.994 [INFO][3435] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:23.075115 env[1373]: 2025-05-17 00:38:22.994 [INFO][3435] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.4.22' May 17 00:38:23.075115 env[1373]: 2025-05-17 00:38:23.003 [INFO][3435] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.ebb7bd79b8ce785c515462a90227fc7236c7b423cf6e2571a3d891413f7f51fa" host="10.200.4.22" May 17 00:38:23.075115 env[1373]: 2025-05-17 00:38:23.013 [INFO][3435] ipam/ipam.go 394: Looking up existing affinities for host host="10.200.4.22" May 17 00:38:23.075115 env[1373]: 2025-05-17 00:38:23.018 [INFO][3435] ipam/ipam.go 511: Trying affinity for 192.168.35.128/26 host="10.200.4.22" May 17 00:38:23.075115 env[1373]: 2025-05-17 00:38:23.019 [INFO][3435] ipam/ipam.go 158: Attempting to load block cidr=192.168.35.128/26 host="10.200.4.22" May 17 00:38:23.075115 env[1373]: 2025-05-17 00:38:23.021 [INFO][3435] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.35.128/26 host="10.200.4.22" May 17 00:38:23.075115 env[1373]: 2025-05-17 00:38:23.022 [INFO][3435] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.35.128/26 handle="k8s-pod-network.ebb7bd79b8ce785c515462a90227fc7236c7b423cf6e2571a3d891413f7f51fa" host="10.200.4.22" May 17 00:38:23.075115 env[1373]: 2025-05-17 00:38:23.023 [INFO][3435] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.ebb7bd79b8ce785c515462a90227fc7236c7b423cf6e2571a3d891413f7f51fa May 17 00:38:23.075115 env[1373]: 2025-05-17 00:38:23.028 [INFO][3435] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.35.128/26 handle="k8s-pod-network.ebb7bd79b8ce785c515462a90227fc7236c7b423cf6e2571a3d891413f7f51fa" host="10.200.4.22" May 17 00:38:23.075115 env[1373]: 2025-05-17 00:38:23.036 [INFO][3435] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.35.132/26] block=192.168.35.128/26 handle="k8s-pod-network.ebb7bd79b8ce785c515462a90227fc7236c7b423cf6e2571a3d891413f7f51fa" host="10.200.4.22" May 17 00:38:23.075115 env[1373]: 2025-05-17 00:38:23.036 [INFO][3435] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.35.132/26] handle="k8s-pod-network.ebb7bd79b8ce785c515462a90227fc7236c7b423cf6e2571a3d891413f7f51fa" host="10.200.4.22" May 17 00:38:23.075115 env[1373]: 2025-05-17 00:38:23.036 [INFO][3435] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:23.075115 env[1373]: 2025-05-17 00:38:23.036 [INFO][3435] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.35.132/26] IPv6=[] ContainerID="ebb7bd79b8ce785c515462a90227fc7236c7b423cf6e2571a3d891413f7f51fa" HandleID="k8s-pod-network.ebb7bd79b8ce785c515462a90227fc7236c7b423cf6e2571a3d891413f7f51fa" Workload="10.200.4.22-k8s-test--pod--1-eth0" May 17 00:38:23.075115 env[1373]: 2025-05-17 00:38:23.038 [INFO][3423] cni-plugin/k8s.go 418: Populated endpoint ContainerID="ebb7bd79b8ce785c515462a90227fc7236c7b423cf6e2571a3d891413f7f51fa" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.4.22-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.22-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"9881c12b-db69-443f-8ba2-5576f26191e7", ResourceVersion:"1641", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.22", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.35.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:38:23.077718 env[1373]: 2025-05-17 00:38:23.038 [INFO][3423] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.35.132/32] ContainerID="ebb7bd79b8ce785c515462a90227fc7236c7b423cf6e2571a3d891413f7f51fa" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.4.22-k8s-test--pod--1-eth0" May 17 00:38:23.077718 env[1373]: 2025-05-17 00:38:23.038 [INFO][3423] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="ebb7bd79b8ce785c515462a90227fc7236c7b423cf6e2571a3d891413f7f51fa" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.4.22-k8s-test--pod--1-eth0" May 17 00:38:23.077718 env[1373]: 2025-05-17 00:38:23.057 [INFO][3423] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ebb7bd79b8ce785c515462a90227fc7236c7b423cf6e2571a3d891413f7f51fa" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.4.22-k8s-test--pod--1-eth0" May 17 00:38:23.077718 env[1373]: 2025-05-17 00:38:23.062 [INFO][3423] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="ebb7bd79b8ce785c515462a90227fc7236c7b423cf6e2571a3d891413f7f51fa" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.4.22-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.22-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"9881c12b-db69-443f-8ba2-5576f26191e7", ResourceVersion:"1641", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.22", ContainerID:"ebb7bd79b8ce785c515462a90227fc7236c7b423cf6e2571a3d891413f7f51fa", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.35.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"56:75:56:b4:b9:1a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:38:23.077718 env[1373]: 2025-05-17 00:38:23.073 [INFO][3423] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="ebb7bd79b8ce785c515462a90227fc7236c7b423cf6e2571a3d891413f7f51fa" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.4.22-k8s-test--pod--1-eth0" May 17 00:38:23.101931 env[1373]: time="2025-05-17T00:38:23.090781465Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:38:23.101931 env[1373]: time="2025-05-17T00:38:23.090857365Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:38:23.101931 env[1373]: time="2025-05-17T00:38:23.090888965Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:38:23.101931 env[1373]: time="2025-05-17T00:38:23.091049866Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ebb7bd79b8ce785c515462a90227fc7236c7b423cf6e2571a3d891413f7f51fa pid=3456 runtime=io.containerd.runc.v2 May 17 00:38:23.105000 audit[3460]: NETFILTER_CFG table=filter:85 family=2 entries=36 op=nft_register_chain pid=3460 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:38:23.105000 audit[3460]: SYSCALL arch=c000003e syscall=46 success=yes exit=19132 a0=3 a1=7ffc5c8303d0 a2=0 a3=7ffc5c8303bc items=0 ppid=2626 pid=3460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:23.105000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:38:23.111996 systemd[1]: Started cri-containerd-ebb7bd79b8ce785c515462a90227fc7236c7b423cf6e2571a3d891413f7f51fa.scope. May 17 00:38:23.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.123000 audit: BPF prog-id=121 op=LOAD May 17 00:38:23.123000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.123000 audit[3465]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3456 pid=3465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:23.123000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562623762643739623863653738356335313534363261393032323766 May 17 00:38:23.123000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.123000 audit[3465]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3456 pid=3465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:23.123000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562623762643739623863653738356335313534363261393032323766 May 17 00:38:23.123000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.123000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.123000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.123000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.123000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.123000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.123000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.123000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.123000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.123000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.123000 audit: BPF prog-id=122 op=LOAD May 17 00:38:23.123000 audit[3465]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025a10 items=0 ppid=3456 pid=3465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:23.123000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562623762643739623863653738356335313534363261393032323766 May 17 00:38:23.123000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.123000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.123000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.123000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.123000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.123000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.123000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.123000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.123000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.123000 audit: BPF prog-id=123 op=LOAD May 17 00:38:23.123000 audit[3465]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000025a58 items=0 ppid=3456 pid=3465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:23.123000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562623762643739623863653738356335313534363261393032323766 May 17 00:38:23.124000 audit: BPF prog-id=123 op=UNLOAD May 17 00:38:23.124000 audit: BPF prog-id=122 op=UNLOAD May 17 00:38:23.124000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.124000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.124000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.124000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.124000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.124000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.124000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.124000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.124000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.124000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.124000 audit: BPF prog-id=124 op=LOAD May 17 00:38:23.124000 audit[3465]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025e68 items=0 ppid=3456 pid=3465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:23.124000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562623762643739623863653738356335313534363261393032323766 May 17 00:38:23.165560 env[1373]: time="2025-05-17T00:38:23.162639620Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:9881c12b-db69-443f-8ba2-5576f26191e7,Namespace:default,Attempt:0,} returns sandbox id \"ebb7bd79b8ce785c515462a90227fc7236c7b423cf6e2571a3d891413f7f51fa\"" May 17 00:38:23.167768 env[1373]: time="2025-05-17T00:38:23.167733052Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 17 00:38:23.509259 kubelet[1889]: E0517 00:38:23.509205 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:23.547266 env[1373]: time="2025-05-17T00:38:23.547214256Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:38:23.555807 env[1373]: time="2025-05-17T00:38:23.555761610Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:38:23.569432 env[1373]: time="2025-05-17T00:38:23.569385197Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:38:23.576437 env[1373]: time="2025-05-17T00:38:23.576398241Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:38:23.577007 env[1373]: time="2025-05-17T00:38:23.576972945Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa\"" May 17 00:38:23.585064 env[1373]: time="2025-05-17T00:38:23.585021396Z" level=info msg="CreateContainer within sandbox \"ebb7bd79b8ce785c515462a90227fc7236c7b423cf6e2571a3d891413f7f51fa\" for container &ContainerMetadata{Name:test,Attempt:0,}" May 17 00:38:23.614642 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2380635772.mount: Deactivated successfully. May 17 00:38:23.629329 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2342094654.mount: Deactivated successfully. May 17 00:38:23.644443 env[1373]: time="2025-05-17T00:38:23.644351572Z" level=info msg="CreateContainer within sandbox \"ebb7bd79b8ce785c515462a90227fc7236c7b423cf6e2571a3d891413f7f51fa\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"844fcd6b0db0831616a6617fa1c731fcd589dc7b517d2fa12c519396ed2f7453\"" May 17 00:38:23.645190 env[1373]: time="2025-05-17T00:38:23.645034376Z" level=info msg="StartContainer for \"844fcd6b0db0831616a6617fa1c731fcd589dc7b517d2fa12c519396ed2f7453\"" May 17 00:38:23.661294 systemd[1]: Started cri-containerd-844fcd6b0db0831616a6617fa1c731fcd589dc7b517d2fa12c519396ed2f7453.scope. May 17 00:38:23.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.676000 audit: BPF prog-id=125 op=LOAD May 17 00:38:23.677000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.677000 audit[3499]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=3456 pid=3499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:23.677000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834346663643662306462303833313631366136363137666131633733 May 17 00:38:23.677000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.677000 audit[3499]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=3456 pid=3499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:23.677000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834346663643662306462303833313631366136363137666131633733 May 17 00:38:23.677000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.677000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.677000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.677000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.677000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.677000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.677000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.677000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.677000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.677000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.677000 audit: BPF prog-id=126 op=LOAD May 17 00:38:23.677000 audit[3499]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c00030ad30 items=0 ppid=3456 pid=3499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:23.677000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834346663643662306462303833313631366136363137666131633733 May 17 00:38:23.678000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.678000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.678000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.678000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.678000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.678000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.678000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.678000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.678000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.678000 audit: BPF prog-id=127 op=LOAD May 17 00:38:23.678000 audit[3499]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c00030ad78 items=0 ppid=3456 pid=3499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:23.678000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834346663643662306462303833313631366136363137666131633733 May 17 00:38:23.679000 audit: BPF prog-id=127 op=UNLOAD May 17 00:38:23.679000 audit: BPF prog-id=126 op=UNLOAD May 17 00:38:23.679000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.679000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.679000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.679000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.679000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.679000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.679000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.679000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.679000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.679000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.679000 audit: BPF prog-id=128 op=LOAD May 17 00:38:23.679000 audit[3499]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c00030b188 items=0 ppid=3456 pid=3499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:23.679000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834346663643662306462303833313631366136363137666131633733 May 17 00:38:23.701002 env[1373]: time="2025-05-17T00:38:23.700949430Z" level=info msg="StartContainer for \"844fcd6b0db0831616a6617fa1c731fcd589dc7b517d2fa12c519396ed2f7453\" returns successfully" May 17 00:38:24.188540 systemd-networkd[1526]: cali5ec59c6bf6e: Gained IPv6LL May 17 00:38:24.510166 kubelet[1889]: E0517 00:38:24.510114 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:24.716366 kubelet[1889]: I0517 00:38:24.716311 1889 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=30.305536393 podStartE2EDuration="30.716295495s" podCreationTimestamp="2025-05-17 00:37:54 +0000 UTC" firstStartedPulling="2025-05-17 00:38:23.16743455 +0000 UTC m=+81.632491659" lastFinishedPulling="2025-05-17 00:38:23.578193552 +0000 UTC m=+82.043250761" observedRunningTime="2025-05-17 00:38:24.716053894 +0000 UTC m=+83.181111003" watchObservedRunningTime="2025-05-17 00:38:24.716295495 +0000 UTC m=+83.181352804" May 17 00:38:25.510383 kubelet[1889]: E0517 00:38:25.510320 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:26.510865 kubelet[1889]: E0517 00:38:26.510830 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:27.511586 kubelet[1889]: E0517 00:38:27.511522 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:28.511921 kubelet[1889]: E0517 00:38:28.511881 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:29.512642 kubelet[1889]: E0517 00:38:29.512583 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:30.512887 kubelet[1889]: E0517 00:38:30.512851 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:31.513641 kubelet[1889]: E0517 00:38:31.513584 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:32.514489 kubelet[1889]: E0517 00:38:32.514450 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"