May 17 00:48:54.991785 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] May 17 00:48:54.991804 kernel: Linux version 5.15.182-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri May 16 23:24:21 -00 2025 May 17 00:48:54.991812 kernel: earlycon: pl11 at MMIO 0x00000000effec000 (options '') May 17 00:48:54.991819 kernel: printk: bootconsole [pl11] enabled May 17 00:48:54.991824 kernel: efi: EFI v2.70 by EDK II May 17 00:48:54.991830 kernel: efi: ACPI 2.0=0x3fd5f018 SMBIOS=0x3e580000 SMBIOS 3.0=0x3e560000 MEMATTR=0x3f214018 RNG=0x3fd5f998 MEMRESERVE=0x3763cf98 May 17 00:48:54.991836 kernel: random: crng init done May 17 00:48:54.991842 kernel: ACPI: Early table checksum verification disabled May 17 00:48:54.991847 kernel: ACPI: RSDP 0x000000003FD5F018 000024 (v02 VRTUAL) May 17 00:48:54.991852 kernel: ACPI: XSDT 0x000000003FD5FF18 00006C (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:48:54.991858 kernel: ACPI: FACP 0x000000003FD5FC18 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:48:54.991863 kernel: ACPI: DSDT 0x000000003FD41018 01DFCD (v02 MSFTVM DSDT01 00000001 INTL 20230628) May 17 00:48:54.991869 kernel: ACPI: DBG2 0x000000003FD5FB18 000072 (v00 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:48:54.991875 kernel: ACPI: GTDT 0x000000003FD5FD98 000060 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:48:54.991882 kernel: ACPI: OEM0 0x000000003FD5F098 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:48:54.991887 kernel: ACPI: SPCR 0x000000003FD5FA98 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:48:54.991893 kernel: ACPI: APIC 0x000000003FD5F818 0000FC (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:48:54.991900 kernel: ACPI: SRAT 0x000000003FD5F198 000234 (v03 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:48:54.991906 kernel: ACPI: PPTT 0x000000003FD5F418 000120 (v01 VRTUAL MICROSFT 00000000 MSFT 00000000) May 17 00:48:54.991912 kernel: ACPI: BGRT 0x000000003FD5FE98 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:48:54.991917 kernel: ACPI: SPCR: console: pl011,mmio32,0xeffec000,115200 May 17 00:48:54.991923 kernel: NUMA: Failed to initialise from firmware May 17 00:48:54.991929 kernel: NUMA: Faking a node at [mem 0x0000000000000000-0x00000001bfffffff] May 17 00:48:54.991935 kernel: NUMA: NODE_DATA [mem 0x1bf7f3900-0x1bf7f8fff] May 17 00:48:54.991940 kernel: Zone ranges: May 17 00:48:54.991946 kernel: DMA [mem 0x0000000000000000-0x00000000ffffffff] May 17 00:48:54.991952 kernel: DMA32 empty May 17 00:48:54.991957 kernel: Normal [mem 0x0000000100000000-0x00000001bfffffff] May 17 00:48:54.991964 kernel: Movable zone start for each node May 17 00:48:54.991970 kernel: Early memory node ranges May 17 00:48:54.991976 kernel: node 0: [mem 0x0000000000000000-0x00000000007fffff] May 17 00:48:54.991981 kernel: node 0: [mem 0x0000000000824000-0x000000003e54ffff] May 17 00:48:54.991987 kernel: node 0: [mem 0x000000003e550000-0x000000003e87ffff] May 17 00:48:54.991992 kernel: node 0: [mem 0x000000003e880000-0x000000003fc7ffff] May 17 00:48:54.991998 kernel: node 0: [mem 0x000000003fc80000-0x000000003fcfffff] May 17 00:48:54.992004 kernel: node 0: [mem 0x000000003fd00000-0x000000003fffffff] May 17 00:48:54.992009 kernel: node 0: [mem 0x0000000100000000-0x00000001bfffffff] May 17 00:48:54.992015 kernel: Initmem setup node 0 [mem 0x0000000000000000-0x00000001bfffffff] May 17 00:48:54.992020 kernel: On node 0, zone DMA: 36 pages in unavailable ranges May 17 00:48:54.992026 kernel: psci: probing for conduit method from ACPI. May 17 00:48:54.992035 kernel: psci: PSCIv1.1 detected in firmware. May 17 00:48:54.992041 kernel: psci: Using standard PSCI v0.2 function IDs May 17 00:48:54.992047 kernel: psci: MIGRATE_INFO_TYPE not supported. May 17 00:48:54.992053 kernel: psci: SMC Calling Convention v1.4 May 17 00:48:54.992059 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x0 -> Node -1 May 17 00:48:54.992066 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1 -> Node -1 May 17 00:48:54.992072 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 May 17 00:48:54.992078 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 May 17 00:48:54.992085 kernel: pcpu-alloc: [0] 0 [0] 1 May 17 00:48:54.992090 kernel: Detected PIPT I-cache on CPU0 May 17 00:48:54.992097 kernel: CPU features: detected: GIC system register CPU interface May 17 00:48:54.992103 kernel: CPU features: detected: Hardware dirty bit management May 17 00:48:54.992109 kernel: CPU features: detected: Spectre-BHB May 17 00:48:54.992115 kernel: CPU features: kernel page table isolation forced ON by KASLR May 17 00:48:54.992121 kernel: CPU features: detected: Kernel page table isolation (KPTI) May 17 00:48:54.992127 kernel: CPU features: detected: ARM erratum 1418040 May 17 00:48:54.992134 kernel: CPU features: detected: ARM erratum 1542419 (kernel portion) May 17 00:48:54.992140 kernel: CPU features: detected: SSBS not fully self-synchronizing May 17 00:48:54.992146 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1032156 May 17 00:48:54.992152 kernel: Policy zone: Normal May 17 00:48:55.000224 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=2d48a3f066dcb37cd386b93b4921577cdf70daa76e7b097cf98da108968f8bb5 May 17 00:48:55.000236 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 17 00:48:55.000243 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 17 00:48:55.000250 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 17 00:48:55.000256 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 17 00:48:55.000263 kernel: software IO TLB: mapped [mem 0x000000003a550000-0x000000003e550000] (64MB) May 17 00:48:55.000269 kernel: Memory: 3986944K/4194160K available (9792K kernel code, 2094K rwdata, 7584K rodata, 36416K init, 777K bss, 207216K reserved, 0K cma-reserved) May 17 00:48:55.000282 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 May 17 00:48:55.000288 kernel: trace event string verifier disabled May 17 00:48:55.000294 kernel: rcu: Preemptible hierarchical RCU implementation. May 17 00:48:55.000302 kernel: rcu: RCU event tracing is enabled. May 17 00:48:55.000308 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. May 17 00:48:55.000315 kernel: Trampoline variant of Tasks RCU enabled. May 17 00:48:55.000321 kernel: Tracing variant of Tasks RCU enabled. May 17 00:48:55.000327 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 17 00:48:55.000333 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 May 17 00:48:55.000339 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 May 17 00:48:55.000345 kernel: GICv3: 960 SPIs implemented May 17 00:48:55.000353 kernel: GICv3: 0 Extended SPIs implemented May 17 00:48:55.000359 kernel: GICv3: Distributor has no Range Selector support May 17 00:48:55.000365 kernel: Root IRQ handler: gic_handle_irq May 17 00:48:55.000371 kernel: GICv3: 16 PPIs implemented May 17 00:48:55.000377 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000effee000 May 17 00:48:55.000383 kernel: ITS: No ITS available, not enabling LPIs May 17 00:48:55.000390 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 17 00:48:55.000396 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). May 17 00:48:55.000402 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns May 17 00:48:55.000408 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns May 17 00:48:55.000415 kernel: Console: colour dummy device 80x25 May 17 00:48:55.000423 kernel: printk: console [tty1] enabled May 17 00:48:55.000429 kernel: ACPI: Core revision 20210730 May 17 00:48:55.000436 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) May 17 00:48:55.000442 kernel: pid_max: default: 32768 minimum: 301 May 17 00:48:55.000449 kernel: LSM: Security Framework initializing May 17 00:48:55.000455 kernel: SELinux: Initializing. May 17 00:48:55.000462 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 17 00:48:55.000468 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 17 00:48:55.000474 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3a8030, hints 0xe, misc 0x31e1 May 17 00:48:55.000482 kernel: Hyper-V: Host Build 10.0.22477.1619-1-0 May 17 00:48:55.000488 kernel: rcu: Hierarchical SRCU implementation. May 17 00:48:55.000495 kernel: Remapping and enabling EFI services. May 17 00:48:55.000501 kernel: smp: Bringing up secondary CPUs ... May 17 00:48:55.000507 kernel: Detected PIPT I-cache on CPU1 May 17 00:48:55.000514 kernel: GICv3: CPU1: found redistributor 1 region 1:0x00000000f000e000 May 17 00:48:55.000520 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 17 00:48:55.000526 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] May 17 00:48:55.000533 kernel: smp: Brought up 1 node, 2 CPUs May 17 00:48:55.000539 kernel: SMP: Total of 2 processors activated. May 17 00:48:55.000547 kernel: CPU features: detected: 32-bit EL0 Support May 17 00:48:55.000553 kernel: CPU features: detected: Instruction cache invalidation not required for I/D coherence May 17 00:48:55.000560 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence May 17 00:48:55.000567 kernel: CPU features: detected: CRC32 instructions May 17 00:48:55.000573 kernel: CPU features: detected: RCpc load-acquire (LDAPR) May 17 00:48:55.000579 kernel: CPU features: detected: LSE atomic instructions May 17 00:48:55.000586 kernel: CPU features: detected: Privileged Access Never May 17 00:48:55.000592 kernel: CPU: All CPU(s) started at EL1 May 17 00:48:55.000598 kernel: alternatives: patching kernel code May 17 00:48:55.000606 kernel: devtmpfs: initialized May 17 00:48:55.000617 kernel: KASLR enabled May 17 00:48:55.000624 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 17 00:48:55.000632 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) May 17 00:48:55.000639 kernel: pinctrl core: initialized pinctrl subsystem May 17 00:48:55.000645 kernel: SMBIOS 3.1.0 present. May 17 00:48:55.000652 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 09/28/2024 May 17 00:48:55.000659 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 17 00:48:55.000666 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations May 17 00:48:55.000674 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations May 17 00:48:55.000681 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations May 17 00:48:55.000688 kernel: audit: initializing netlink subsys (disabled) May 17 00:48:55.000694 kernel: audit: type=2000 audit(0.087:1): state=initialized audit_enabled=0 res=1 May 17 00:48:55.000701 kernel: thermal_sys: Registered thermal governor 'step_wise' May 17 00:48:55.000708 kernel: cpuidle: using governor menu May 17 00:48:55.000714 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. May 17 00:48:55.000722 kernel: ASID allocator initialised with 32768 entries May 17 00:48:55.000729 kernel: ACPI: bus type PCI registered May 17 00:48:55.000736 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 17 00:48:55.000742 kernel: Serial: AMBA PL011 UART driver May 17 00:48:55.000749 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 17 00:48:55.000756 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages May 17 00:48:55.000762 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 17 00:48:55.000769 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages May 17 00:48:55.000775 kernel: cryptd: max_cpu_qlen set to 1000 May 17 00:48:55.000783 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) May 17 00:48:55.000790 kernel: ACPI: Added _OSI(Module Device) May 17 00:48:55.000796 kernel: ACPI: Added _OSI(Processor Device) May 17 00:48:55.000803 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 17 00:48:55.000810 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 17 00:48:55.000816 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 17 00:48:55.000823 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 17 00:48:55.000830 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 17 00:48:55.000836 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 17 00:48:55.000844 kernel: ACPI: Interpreter enabled May 17 00:48:55.000851 kernel: ACPI: Using GIC for interrupt routing May 17 00:48:55.000858 kernel: ARMH0011:00: ttyAMA0 at MMIO 0xeffec000 (irq = 12, base_baud = 0) is a SBSA May 17 00:48:55.000865 kernel: printk: console [ttyAMA0] enabled May 17 00:48:55.000871 kernel: printk: bootconsole [pl11] disabled May 17 00:48:55.000878 kernel: ARMH0011:01: ttyAMA1 at MMIO 0xeffeb000 (irq = 13, base_baud = 0) is a SBSA May 17 00:48:55.000884 kernel: iommu: Default domain type: Translated May 17 00:48:55.000891 kernel: iommu: DMA domain TLB invalidation policy: strict mode May 17 00:48:55.000898 kernel: vgaarb: loaded May 17 00:48:55.000904 kernel: pps_core: LinuxPPS API ver. 1 registered May 17 00:48:55.000912 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 17 00:48:55.000919 kernel: PTP clock support registered May 17 00:48:55.000926 kernel: Registered efivars operations May 17 00:48:55.000932 kernel: No ACPI PMU IRQ for CPU0 May 17 00:48:55.000939 kernel: No ACPI PMU IRQ for CPU1 May 17 00:48:55.000946 kernel: clocksource: Switched to clocksource arch_sys_counter May 17 00:48:55.000952 kernel: VFS: Disk quotas dquot_6.6.0 May 17 00:48:55.000959 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 17 00:48:55.000967 kernel: pnp: PnP ACPI init May 17 00:48:55.000974 kernel: pnp: PnP ACPI: found 0 devices May 17 00:48:55.000980 kernel: NET: Registered PF_INET protocol family May 17 00:48:55.000987 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 17 00:48:55.000994 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 17 00:48:55.001001 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 17 00:48:55.001008 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 17 00:48:55.001014 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 17 00:48:55.001021 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 17 00:48:55.001029 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 17 00:48:55.001036 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 17 00:48:55.001042 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 17 00:48:55.001049 kernel: PCI: CLS 0 bytes, default 64 May 17 00:48:55.001056 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 1 counters available May 17 00:48:55.001062 kernel: kvm [1]: HYP mode not available May 17 00:48:55.001069 kernel: Initialise system trusted keyrings May 17 00:48:55.001075 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 17 00:48:55.001082 kernel: Key type asymmetric registered May 17 00:48:55.001090 kernel: Asymmetric key parser 'x509' registered May 17 00:48:55.001096 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 17 00:48:55.001103 kernel: io scheduler mq-deadline registered May 17 00:48:55.001110 kernel: io scheduler kyber registered May 17 00:48:55.001116 kernel: io scheduler bfq registered May 17 00:48:55.001123 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 17 00:48:55.001129 kernel: thunder_xcv, ver 1.0 May 17 00:48:55.001136 kernel: thunder_bgx, ver 1.0 May 17 00:48:55.001143 kernel: nicpf, ver 1.0 May 17 00:48:55.001149 kernel: nicvf, ver 1.0 May 17 00:48:55.001302 kernel: rtc-efi rtc-efi.0: registered as rtc0 May 17 00:48:55.001363 kernel: rtc-efi rtc-efi.0: setting system clock to 2025-05-17T00:48:54 UTC (1747442934) May 17 00:48:55.001372 kernel: efifb: probing for efifb May 17 00:48:55.001379 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k May 17 00:48:55.001386 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 May 17 00:48:55.001393 kernel: efifb: scrolling: redraw May 17 00:48:55.001400 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 May 17 00:48:55.001409 kernel: Console: switching to colour frame buffer device 128x48 May 17 00:48:55.001416 kernel: fb0: EFI VGA frame buffer device May 17 00:48:55.001423 kernel: SMCCC: SOC_ID: ARCH_SOC_ID not implemented, skipping .... May 17 00:48:55.001429 kernel: hid: raw HID events driver (C) Jiri Kosina May 17 00:48:55.001436 kernel: NET: Registered PF_INET6 protocol family May 17 00:48:55.001442 kernel: Segment Routing with IPv6 May 17 00:48:55.001449 kernel: In-situ OAM (IOAM) with IPv6 May 17 00:48:55.001456 kernel: NET: Registered PF_PACKET protocol family May 17 00:48:55.001462 kernel: Key type dns_resolver registered May 17 00:48:55.001469 kernel: registered taskstats version 1 May 17 00:48:55.001476 kernel: Loading compiled-in X.509 certificates May 17 00:48:55.001483 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.182-flatcar: 2fa973ae674d09a62938b8c6a2b9446b5340adb7' May 17 00:48:55.001490 kernel: Key type .fscrypt registered May 17 00:48:55.001496 kernel: Key type fscrypt-provisioning registered May 17 00:48:55.001503 kernel: ima: No TPM chip found, activating TPM-bypass! May 17 00:48:55.001510 kernel: ima: Allocated hash algorithm: sha1 May 17 00:48:55.001516 kernel: ima: No architecture policies found May 17 00:48:55.001523 kernel: clk: Disabling unused clocks May 17 00:48:55.001531 kernel: Freeing unused kernel memory: 36416K May 17 00:48:55.001537 kernel: Run /init as init process May 17 00:48:55.001544 kernel: with arguments: May 17 00:48:55.001551 kernel: /init May 17 00:48:55.001558 kernel: with environment: May 17 00:48:55.001564 kernel: HOME=/ May 17 00:48:55.001571 kernel: TERM=linux May 17 00:48:55.001577 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 17 00:48:55.001586 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 00:48:55.001596 systemd[1]: Detected virtualization microsoft. May 17 00:48:55.001603 systemd[1]: Detected architecture arm64. May 17 00:48:55.001611 systemd[1]: Running in initrd. May 17 00:48:55.001618 systemd[1]: No hostname configured, using default hostname. May 17 00:48:55.001625 systemd[1]: Hostname set to . May 17 00:48:55.001632 systemd[1]: Initializing machine ID from random generator. May 17 00:48:55.001639 systemd[1]: Queued start job for default target initrd.target. May 17 00:48:55.001647 systemd[1]: Started systemd-ask-password-console.path. May 17 00:48:55.001654 systemd[1]: Reached target cryptsetup.target. May 17 00:48:55.001661 systemd[1]: Reached target paths.target. May 17 00:48:55.001669 systemd[1]: Reached target slices.target. May 17 00:48:55.001676 systemd[1]: Reached target swap.target. May 17 00:48:55.001682 systemd[1]: Reached target timers.target. May 17 00:48:55.001690 systemd[1]: Listening on iscsid.socket. May 17 00:48:55.001697 systemd[1]: Listening on iscsiuio.socket. May 17 00:48:55.001705 systemd[1]: Listening on systemd-journald-audit.socket. May 17 00:48:55.001712 systemd[1]: Listening on systemd-journald-dev-log.socket. May 17 00:48:55.001720 systemd[1]: Listening on systemd-journald.socket. May 17 00:48:55.001727 systemd[1]: Listening on systemd-networkd.socket. May 17 00:48:55.001734 systemd[1]: Listening on systemd-udevd-control.socket. May 17 00:48:55.001741 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 00:48:55.001748 systemd[1]: Reached target sockets.target. May 17 00:48:55.001755 systemd[1]: Starting kmod-static-nodes.service... May 17 00:48:55.001762 systemd[1]: Finished network-cleanup.service. May 17 00:48:55.001771 systemd[1]: Starting systemd-fsck-usr.service... May 17 00:48:55.001778 systemd[1]: Starting systemd-journald.service... May 17 00:48:55.001785 systemd[1]: Starting systemd-modules-load.service... May 17 00:48:55.001792 systemd[1]: Starting systemd-resolved.service... May 17 00:48:55.001804 systemd-journald[276]: Journal started May 17 00:48:55.001846 systemd-journald[276]: Runtime Journal (/run/log/journal/2dbadb1a58a44f1e8488504d621a6bba) is 8.0M, max 78.5M, 70.5M free. May 17 00:48:54.995115 systemd-modules-load[277]: Inserted module 'overlay' May 17 00:48:55.021772 systemd[1]: Starting systemd-vconsole-setup.service... May 17 00:48:55.034186 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 17 00:48:55.040173 systemd[1]: Started systemd-journald.service. May 17 00:48:55.047501 systemd-modules-load[277]: Inserted module 'br_netfilter' May 17 00:48:55.073452 kernel: Bridge firewalling registered May 17 00:48:55.073475 kernel: audit: type=1130 audit(1747442935.053:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:55.053000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:55.051424 systemd-resolved[278]: Positive Trust Anchors: May 17 00:48:55.051433 systemd-resolved[278]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 00:48:55.195297 kernel: SCSI subsystem initialized May 17 00:48:55.195322 kernel: audit: type=1130 audit(1747442935.077:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:55.195332 kernel: audit: type=1130 audit(1747442935.081:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:55.195341 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 17 00:48:55.195351 kernel: audit: type=1130 audit(1747442935.124:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:55.195359 kernel: device-mapper: uevent: version 1.0.3 May 17 00:48:55.195369 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 17 00:48:55.195377 kernel: audit: type=1130 audit(1747442935.176:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:55.077000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:55.081000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:55.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:55.176000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:55.051461 systemd-resolved[278]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 00:48:55.053811 systemd[1]: Finished kmod-static-nodes.service. May 17 00:48:55.058378 systemd-resolved[278]: Defaulting to hostname 'linux'. May 17 00:48:55.077389 systemd[1]: Started systemd-resolved.service. May 17 00:48:55.286253 kernel: audit: type=1130 audit(1747442935.264:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:55.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:55.081905 systemd[1]: Finished systemd-fsck-usr.service. May 17 00:48:55.333502 kernel: audit: type=1130 audit(1747442935.291:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:55.333525 kernel: audit: type=1130 audit(1747442935.316:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:55.291000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:55.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:55.125063 systemd[1]: Finished systemd-vconsole-setup.service. May 17 00:48:55.176575 systemd[1]: Reached target nss-lookup.target. May 17 00:48:55.200129 systemd[1]: Starting dracut-cmdline-ask.service... May 17 00:48:55.230570 systemd-modules-load[277]: Inserted module 'dm_multipath' May 17 00:48:55.236268 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 17 00:48:55.241606 systemd[1]: Finished systemd-modules-load.service. May 17 00:48:55.265830 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 17 00:48:55.291740 systemd[1]: Finished dracut-cmdline-ask.service. May 17 00:48:55.355337 systemd[1]: Starting dracut-cmdline.service... May 17 00:48:55.369550 systemd[1]: Starting systemd-sysctl.service... May 17 00:48:55.395539 dracut-cmdline[296]: dracut-dracut-053 May 17 00:48:55.395539 dracut-cmdline[296]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=2d48a3f066dcb37cd386b93b4921577cdf70daa76e7b097cf98da108968f8bb5 May 17 00:48:55.454067 kernel: audit: type=1130 audit(1747442935.400:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:55.400000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:55.391081 systemd[1]: Finished systemd-sysctl.service. May 17 00:48:55.481198 kernel: Loading iSCSI transport class v2.0-870. May 17 00:48:55.497186 kernel: iscsi: registered transport (tcp) May 17 00:48:55.517514 kernel: iscsi: registered transport (qla4xxx) May 17 00:48:55.517570 kernel: QLogic iSCSI HBA Driver May 17 00:48:55.551768 systemd[1]: Finished dracut-cmdline.service. May 17 00:48:55.560000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:55.561086 systemd[1]: Starting dracut-pre-udev.service... May 17 00:48:55.610174 kernel: raid6: neonx8 gen() 13737 MB/s May 17 00:48:55.630168 kernel: raid6: neonx8 xor() 10794 MB/s May 17 00:48:55.650165 kernel: raid6: neonx4 gen() 13538 MB/s May 17 00:48:55.670168 kernel: raid6: neonx4 xor() 11182 MB/s May 17 00:48:55.691165 kernel: raid6: neonx2 gen() 12977 MB/s May 17 00:48:55.711164 kernel: raid6: neonx2 xor() 10492 MB/s May 17 00:48:55.732165 kernel: raid6: neonx1 gen() 10636 MB/s May 17 00:48:55.753164 kernel: raid6: neonx1 xor() 8781 MB/s May 17 00:48:55.773165 kernel: raid6: int64x8 gen() 6270 MB/s May 17 00:48:55.793164 kernel: raid6: int64x8 xor() 3546 MB/s May 17 00:48:55.814166 kernel: raid6: int64x4 gen() 7229 MB/s May 17 00:48:55.834168 kernel: raid6: int64x4 xor() 3856 MB/s May 17 00:48:55.854164 kernel: raid6: int64x2 gen() 6155 MB/s May 17 00:48:55.875166 kernel: raid6: int64x2 xor() 3321 MB/s May 17 00:48:55.895164 kernel: raid6: int64x1 gen() 5047 MB/s May 17 00:48:55.920250 kernel: raid6: int64x1 xor() 2647 MB/s May 17 00:48:55.920260 kernel: raid6: using algorithm neonx8 gen() 13737 MB/s May 17 00:48:55.920268 kernel: raid6: .... xor() 10794 MB/s, rmw enabled May 17 00:48:55.924493 kernel: raid6: using neon recovery algorithm May 17 00:48:55.945206 kernel: xor: measuring software checksum speed May 17 00:48:55.945217 kernel: 8regs : 17235 MB/sec May 17 00:48:55.949174 kernel: 32regs : 20702 MB/sec May 17 00:48:55.952905 kernel: arm64_neon : 27757 MB/sec May 17 00:48:55.952914 kernel: xor: using function: arm64_neon (27757 MB/sec) May 17 00:48:56.013175 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no May 17 00:48:56.021429 systemd[1]: Finished dracut-pre-udev.service. May 17 00:48:56.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:56.029000 audit: BPF prog-id=7 op=LOAD May 17 00:48:56.030000 audit: BPF prog-id=8 op=LOAD May 17 00:48:56.030649 systemd[1]: Starting systemd-udevd.service... May 17 00:48:56.048581 systemd-udevd[476]: Using default interface naming scheme 'v252'. May 17 00:48:56.054862 systemd[1]: Started systemd-udevd.service. May 17 00:48:56.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:56.064914 systemd[1]: Starting dracut-pre-trigger.service... May 17 00:48:56.079742 dracut-pre-trigger[497]: rd.md=0: removing MD RAID activation May 17 00:48:56.108051 systemd[1]: Finished dracut-pre-trigger.service. May 17 00:48:56.112000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:56.113587 systemd[1]: Starting systemd-udev-trigger.service... May 17 00:48:56.151033 systemd[1]: Finished systemd-udev-trigger.service. May 17 00:48:56.160000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:56.196180 kernel: hv_vmbus: Vmbus version:5.3 May 17 00:48:56.214846 kernel: hv_vmbus: registering driver hid_hyperv May 17 00:48:56.214897 kernel: hv_vmbus: registering driver hyperv_keyboard May 17 00:48:56.214910 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input0 May 17 00:48:56.223746 kernel: hid-generic 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on May 17 00:48:56.245203 kernel: hv_vmbus: registering driver hv_netvsc May 17 00:48:56.245265 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/MSFT1000:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input1 May 17 00:48:56.253776 kernel: hv_vmbus: registering driver hv_storvsc May 17 00:48:56.263050 kernel: scsi host1: storvsc_host_t May 17 00:48:56.263281 kernel: scsi host0: storvsc_host_t May 17 00:48:56.270794 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 May 17 00:48:56.278183 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 May 17 00:48:56.302350 kernel: sr 0:0:0:2: [sr0] scsi-1 drive May 17 00:48:56.313791 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 May 17 00:48:56.313806 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) May 17 00:48:56.335217 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 May 17 00:48:56.335330 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks May 17 00:48:56.335408 kernel: sd 0:0:0:0: [sda] Write Protect is off May 17 00:48:56.335481 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 May 17 00:48:56.335554 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA May 17 00:48:56.335633 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 00:48:56.335643 kernel: sd 0:0:0:0: [sda] Attached SCSI disk May 17 00:48:56.354178 kernel: hv_netvsc 002248b7-2251-0022-48b7-2251002248b7 eth0: VF slot 1 added May 17 00:48:56.369427 kernel: hv_vmbus: registering driver hv_pci May 17 00:48:56.369493 kernel: hv_pci 7afe9a3d-a1fa-4039-953d-aac49560d695: PCI VMBus probing: Using version 0x10004 May 17 00:48:56.478347 kernel: hv_pci 7afe9a3d-a1fa-4039-953d-aac49560d695: PCI host bridge to bus a1fa:00 May 17 00:48:56.478460 kernel: pci_bus a1fa:00: root bus resource [mem 0xfc0000000-0xfc00fffff window] May 17 00:48:56.478555 kernel: pci_bus a1fa:00: No busn resource found for root bus, will use [bus 00-ff] May 17 00:48:56.478627 kernel: pci a1fa:00:02.0: [15b3:1018] type 00 class 0x020000 May 17 00:48:56.478730 kernel: pci a1fa:00:02.0: reg 0x10: [mem 0xfc0000000-0xfc00fffff 64bit pref] May 17 00:48:56.478812 kernel: pci a1fa:00:02.0: enabling Extended Tags May 17 00:48:56.478894 kernel: pci a1fa:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at a1fa:00:02.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) May 17 00:48:56.478979 kernel: pci_bus a1fa:00: busn_res: [bus 00-ff] end is updated to 00 May 17 00:48:56.479053 kernel: pci a1fa:00:02.0: BAR 0: assigned [mem 0xfc0000000-0xfc00fffff 64bit pref] May 17 00:48:56.515183 kernel: mlx5_core a1fa:00:02.0: firmware version: 16.30.1284 May 17 00:48:56.737427 kernel: mlx5_core a1fa:00:02.0: MLX5E: StrdRq(1) RqSz(8) StrdSz(2048) RxCqeCmprss(0) May 17 00:48:56.737536 kernel: hv_netvsc 002248b7-2251-0022-48b7-2251002248b7 eth0: VF registering: eth1 May 17 00:48:56.737616 kernel: mlx5_core a1fa:00:02.0 eth1: joined to eth0 May 17 00:48:56.746180 kernel: mlx5_core a1fa:00:02.0 enP41466s1: renamed from eth1 May 17 00:48:56.765550 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 17 00:48:56.788186 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (536) May 17 00:48:56.800633 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 00:48:56.930514 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 17 00:48:56.946949 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 17 00:48:56.953070 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 17 00:48:56.971222 systemd[1]: Starting disk-uuid.service... May 17 00:48:56.993062 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 00:48:58.010849 disk-uuid[602]: The operation has completed successfully. May 17 00:48:58.015979 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 00:48:58.065101 systemd[1]: disk-uuid.service: Deactivated successfully. May 17 00:48:58.069000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:58.069000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:58.065214 systemd[1]: Finished disk-uuid.service. May 17 00:48:58.078442 systemd[1]: Starting verity-setup.service... May 17 00:48:58.116177 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" May 17 00:48:58.293104 systemd[1]: Found device dev-mapper-usr.device. May 17 00:48:58.299144 systemd[1]: Mounting sysusr-usr.mount... May 17 00:48:58.311121 systemd[1]: Finished verity-setup.service. May 17 00:48:58.315000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:58.366079 systemd[1]: Mounted sysusr-usr.mount. May 17 00:48:58.373513 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 17 00:48:58.370237 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 17 00:48:58.370936 systemd[1]: Starting ignition-setup.service... May 17 00:48:58.377756 systemd[1]: Starting parse-ip-for-networkd.service... May 17 00:48:58.414307 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm May 17 00:48:58.414347 kernel: BTRFS info (device sda6): using free space tree May 17 00:48:58.419850 kernel: BTRFS info (device sda6): has skinny extents May 17 00:48:58.457689 systemd[1]: Finished parse-ip-for-networkd.service. May 17 00:48:58.462000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:58.466000 audit: BPF prog-id=9 op=LOAD May 17 00:48:58.467225 systemd[1]: Starting systemd-networkd.service... May 17 00:48:58.488390 systemd-networkd[869]: lo: Link UP May 17 00:48:58.488402 systemd-networkd[869]: lo: Gained carrier May 17 00:48:58.496000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:58.488792 systemd-networkd[869]: Enumeration completed May 17 00:48:58.491824 systemd[1]: Started systemd-networkd.service. May 17 00:48:58.496964 systemd[1]: Reached target network.target. May 17 00:48:58.521000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:58.504806 systemd-networkd[869]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 00:48:58.534144 iscsid[881]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 17 00:48:58.534144 iscsid[881]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log May 17 00:48:58.534144 iscsid[881]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 17 00:48:58.534144 iscsid[881]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 17 00:48:58.534144 iscsid[881]: If using hardware iscsi like qla4xxx this message can be ignored. May 17 00:48:58.534144 iscsid[881]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 17 00:48:58.534144 iscsid[881]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 17 00:48:58.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:58.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:58.505775 systemd[1]: Starting iscsiuio.service... May 17 00:48:58.517555 systemd[1]: Started iscsiuio.service. May 17 00:48:58.525572 systemd[1]: Starting iscsid.service... May 17 00:48:58.538065 systemd[1]: mnt-oem.mount: Deactivated successfully. May 17 00:48:58.538434 systemd[1]: Started iscsid.service. May 17 00:48:58.568492 systemd[1]: Starting dracut-initqueue.service... May 17 00:48:58.601599 systemd[1]: Finished dracut-initqueue.service. May 17 00:48:58.612284 systemd[1]: Reached target remote-fs-pre.target. May 17 00:48:58.677966 kernel: mlx5_core a1fa:00:02.0 enP41466s1: Link up May 17 00:48:58.624479 systemd[1]: Reached target remote-cryptsetup.target. May 17 00:48:58.682000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:58.632948 systemd[1]: Reached target remote-fs.target. May 17 00:48:58.644391 systemd[1]: Starting dracut-pre-mount.service... May 17 00:48:58.664043 systemd[1]: Finished dracut-pre-mount.service. May 17 00:48:58.702000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:48:58.694119 systemd[1]: Finished ignition-setup.service. May 17 00:48:58.706985 systemd[1]: Starting ignition-fetch-offline.service... May 17 00:48:58.735754 kernel: hv_netvsc 002248b7-2251-0022-48b7-2251002248b7 eth0: Data path switched to VF: enP41466s1 May 17 00:48:58.735899 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:48:58.730392 systemd-networkd[869]: enP41466s1: Link UP May 17 00:48:58.730472 systemd-networkd[869]: eth0: Link UP May 17 00:48:58.730591 systemd-networkd[869]: eth0: Gained carrier May 17 00:48:58.748048 systemd-networkd[869]: enP41466s1: Gained carrier May 17 00:48:58.760221 systemd-networkd[869]: eth0: DHCPv4 address 10.200.20.28/24, gateway 10.200.20.1 acquired from 168.63.129.16 May 17 00:49:00.032289 systemd-networkd[869]: eth0: Gained IPv6LL May 17 00:49:01.014472 ignition[897]: Ignition 2.14.0 May 17 00:49:01.017523 ignition[897]: Stage: fetch-offline May 17 00:49:01.017599 ignition[897]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:49:01.017623 ignition[897]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:49:01.050296 ignition[897]: no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:49:01.050436 ignition[897]: parsed url from cmdline: "" May 17 00:49:01.056387 systemd[1]: Finished ignition-fetch-offline.service. May 17 00:49:01.061000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:01.050439 ignition[897]: no config URL provided May 17 00:49:01.090660 kernel: kauditd_printk_skb: 18 callbacks suppressed May 17 00:49:01.090687 kernel: audit: type=1130 audit(1747442941.061:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:01.050444 ignition[897]: reading system config file "/usr/lib/ignition/user.ign" May 17 00:49:01.070849 systemd[1]: Starting ignition-fetch.service... May 17 00:49:01.050451 ignition[897]: no config at "/usr/lib/ignition/user.ign" May 17 00:49:01.050456 ignition[897]: failed to fetch config: resource requires networking May 17 00:49:01.050549 ignition[897]: Ignition finished successfully May 17 00:49:01.077583 ignition[903]: Ignition 2.14.0 May 17 00:49:01.077588 ignition[903]: Stage: fetch May 17 00:49:01.077684 ignition[903]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:49:01.077708 ignition[903]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:49:01.082389 ignition[903]: no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:49:01.082641 ignition[903]: parsed url from cmdline: "" May 17 00:49:01.082645 ignition[903]: no config URL provided May 17 00:49:01.082650 ignition[903]: reading system config file "/usr/lib/ignition/user.ign" May 17 00:49:01.082672 ignition[903]: no config at "/usr/lib/ignition/user.ign" May 17 00:49:01.082700 ignition[903]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 May 17 00:49:01.164213 ignition[903]: GET result: OK May 17 00:49:01.166528 unknown[903]: fetched base config from "system" May 17 00:49:01.164260 ignition[903]: config has been read from IMDS userdata May 17 00:49:01.202216 kernel: audit: type=1130 audit(1747442941.178:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:01.178000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:01.166535 unknown[903]: fetched base config from "system" May 17 00:49:01.164276 ignition[903]: parsing config with SHA512: 661f7597bef3c6dec25e1e6abf6628a74a77aae4151cba820a22aec55e558c88ffdfbb03db543499cffc2ed37ef86e89fcbffbb4f85186f2baaf7d9087f8c604 May 17 00:49:01.166540 unknown[903]: fetched user config from "azure" May 17 00:49:01.166876 ignition[903]: fetch: fetch complete May 17 00:49:01.171375 systemd[1]: Finished ignition-fetch.service. May 17 00:49:01.166881 ignition[903]: fetch: fetch passed May 17 00:49:01.246444 kernel: audit: type=1130 audit(1747442941.223:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:01.223000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:01.179955 systemd[1]: Starting ignition-kargs.service... May 17 00:49:01.166926 ignition[903]: Ignition finished successfully May 17 00:49:01.278251 kernel: audit: type=1130 audit(1747442941.260:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:01.260000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:01.215427 systemd[1]: Finished ignition-kargs.service. May 17 00:49:01.208728 ignition[910]: Ignition 2.14.0 May 17 00:49:01.224519 systemd[1]: Starting ignition-disks.service... May 17 00:49:01.208734 ignition[910]: Stage: kargs May 17 00:49:01.251076 systemd[1]: Finished ignition-disks.service. May 17 00:49:01.208831 ignition[910]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:49:01.260501 systemd[1]: Reached target initrd-root-device.target. May 17 00:49:01.208847 ignition[910]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:49:01.284003 systemd[1]: Reached target local-fs-pre.target. May 17 00:49:01.211379 ignition[910]: no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:49:01.292600 systemd[1]: Reached target local-fs.target. May 17 00:49:01.213337 ignition[910]: kargs: kargs passed May 17 00:49:01.299981 systemd[1]: Reached target sysinit.target. May 17 00:49:01.213377 ignition[910]: Ignition finished successfully May 17 00:49:01.308282 systemd[1]: Reached target basic.target. May 17 00:49:01.232917 ignition[916]: Ignition 2.14.0 May 17 00:49:01.316711 systemd[1]: Starting systemd-fsck-root.service... May 17 00:49:01.232923 ignition[916]: Stage: disks May 17 00:49:01.233031 ignition[916]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:49:01.233052 ignition[916]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:49:01.235849 ignition[916]: no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:49:01.244269 ignition[916]: disks: disks passed May 17 00:49:01.244330 ignition[916]: Ignition finished successfully May 17 00:49:01.421973 systemd-fsck[924]: ROOT: clean, 619/7326000 files, 481078/7359488 blocks May 17 00:49:01.433749 systemd[1]: Finished systemd-fsck-root.service. May 17 00:49:01.462147 kernel: audit: type=1130 audit(1747442941.438:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:01.438000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:01.439506 systemd[1]: Mounting sysroot.mount... May 17 00:49:01.481174 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 17 00:49:01.478985 systemd[1]: Mounted sysroot.mount. May 17 00:49:01.482849 systemd[1]: Reached target initrd-root-fs.target. May 17 00:49:01.520394 systemd[1]: Mounting sysroot-usr.mount... May 17 00:49:01.524887 systemd[1]: Starting flatcar-metadata-hostname.service... May 17 00:49:01.532491 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 17 00:49:01.532537 systemd[1]: Reached target ignition-diskful.target. May 17 00:49:01.543678 systemd[1]: Mounted sysroot-usr.mount. May 17 00:49:01.602145 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 17 00:49:01.607069 systemd[1]: Starting initrd-setup-root.service... May 17 00:49:01.631377 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (934) May 17 00:49:01.637883 initrd-setup-root[939]: cut: /sysroot/etc/passwd: No such file or directory May 17 00:49:01.648386 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm May 17 00:49:01.648407 kernel: BTRFS info (device sda6): using free space tree May 17 00:49:01.648500 kernel: BTRFS info (device sda6): has skinny extents May 17 00:49:01.654513 initrd-setup-root[963]: cut: /sysroot/etc/group: No such file or directory May 17 00:49:01.665031 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 17 00:49:01.677251 initrd-setup-root[973]: cut: /sysroot/etc/shadow: No such file or directory May 17 00:49:01.686537 initrd-setup-root[981]: cut: /sysroot/etc/gshadow: No such file or directory May 17 00:49:02.147376 systemd[1]: Finished initrd-setup-root.service. May 17 00:49:02.151000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:02.152907 systemd[1]: Starting ignition-mount.service... May 17 00:49:02.184442 kernel: audit: type=1130 audit(1747442942.151:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:02.175694 systemd[1]: Starting sysroot-boot.service... May 17 00:49:02.180662 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. May 17 00:49:02.180787 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. May 17 00:49:02.207806 systemd[1]: Finished sysroot-boot.service. May 17 00:49:02.212000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:02.233765 kernel: audit: type=1130 audit(1747442942.212:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:02.239905 ignition[1003]: INFO : Ignition 2.14.0 May 17 00:49:02.239905 ignition[1003]: INFO : Stage: mount May 17 00:49:02.253386 ignition[1003]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:49:02.253386 ignition[1003]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:49:02.253386 ignition[1003]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:49:02.253386 ignition[1003]: INFO : mount: mount passed May 17 00:49:02.253386 ignition[1003]: INFO : Ignition finished successfully May 17 00:49:02.305724 kernel: audit: type=1130 audit(1747442942.253:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:02.253000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:02.249377 systemd[1]: Finished ignition-mount.service. May 17 00:49:02.743635 coreos-metadata[933]: May 17 00:49:02.743 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 May 17 00:49:02.752432 coreos-metadata[933]: May 17 00:49:02.747 INFO Fetch successful May 17 00:49:02.779934 coreos-metadata[933]: May 17 00:49:02.779 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 May 17 00:49:02.792595 coreos-metadata[933]: May 17 00:49:02.789 INFO Fetch successful May 17 00:49:02.805299 coreos-metadata[933]: May 17 00:49:02.805 INFO wrote hostname ci-3510.3.7-n-b41680b403 to /sysroot/etc/hostname May 17 00:49:02.807332 systemd[1]: Finished flatcar-metadata-hostname.service. May 17 00:49:02.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:02.819883 systemd[1]: Starting ignition-files.service... May 17 00:49:02.848473 kernel: audit: type=1130 audit(1747442942.818:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:02.850974 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 17 00:49:02.878060 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (1012) May 17 00:49:02.878108 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm May 17 00:49:02.883383 kernel: BTRFS info (device sda6): using free space tree May 17 00:49:02.889758 kernel: BTRFS info (device sda6): has skinny extents May 17 00:49:02.894742 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 17 00:49:02.911965 ignition[1031]: INFO : Ignition 2.14.0 May 17 00:49:02.917188 ignition[1031]: INFO : Stage: files May 17 00:49:02.917188 ignition[1031]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:49:02.917188 ignition[1031]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:49:02.941462 ignition[1031]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:49:02.941462 ignition[1031]: DEBUG : files: compiled without relabeling support, skipping May 17 00:49:02.941462 ignition[1031]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 17 00:49:02.941462 ignition[1031]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 17 00:49:02.983558 ignition[1031]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 17 00:49:02.991474 ignition[1031]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 17 00:49:03.005050 unknown[1031]: wrote ssh authorized keys file for user: core May 17 00:49:03.010767 ignition[1031]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 17 00:49:03.010767 ignition[1031]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" May 17 00:49:03.010767 ignition[1031]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" May 17 00:49:03.038258 ignition[1031]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" May 17 00:49:03.038258 ignition[1031]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 17 00:49:03.038258 ignition[1031]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.8-arm64.raw" May 17 00:49:03.038258 ignition[1031]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.8-arm64.raw" May 17 00:49:03.038258 ignition[1031]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/etc/systemd/system/waagent.service" May 17 00:49:03.038258 ignition[1031]: INFO : files: createFilesystemsFiles: createFiles: op(6): oem config not found in "/usr/share/oem", looking on oem partition May 17 00:49:03.038258 ignition[1031]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2228727758" May 17 00:49:03.038258 ignition[1031]: CRITICAL : files: createFilesystemsFiles: createFiles: op(6): op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2228727758": device or resource busy May 17 00:49:03.038258 ignition[1031]: ERROR : files: createFilesystemsFiles: createFiles: op(6): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2228727758", trying btrfs: device or resource busy May 17 00:49:03.038258 ignition[1031]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2228727758" May 17 00:49:03.038258 ignition[1031]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2228727758" May 17 00:49:03.038258 ignition[1031]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [started] unmounting "/mnt/oem2228727758" May 17 00:49:03.038258 ignition[1031]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [finished] unmounting "/mnt/oem2228727758" May 17 00:49:03.038258 ignition[1031]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" May 17 00:49:03.032806 systemd[1]: mnt-oem2228727758.mount: Deactivated successfully. May 17 00:49:03.202680 ignition[1031]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" May 17 00:49:03.202680 ignition[1031]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition May 17 00:49:03.202680 ignition[1031]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem583671567" May 17 00:49:03.202680 ignition[1031]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem583671567": device or resource busy May 17 00:49:03.202680 ignition[1031]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem583671567", trying btrfs: device or resource busy May 17 00:49:03.202680 ignition[1031]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem583671567" May 17 00:49:03.202680 ignition[1031]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem583671567" May 17 00:49:03.202680 ignition[1031]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem583671567" May 17 00:49:03.202680 ignition[1031]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem583671567" May 17 00:49:03.202680 ignition[1031]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" May 17 00:49:03.202680 ignition[1031]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.8-arm64.raw" May 17 00:49:03.202680 ignition[1031]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET https://extensions.flatcar.org/extensions/kubernetes-v1.31.8-arm64.raw: attempt #1 May 17 00:49:04.160434 ignition[1031]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET result: OK May 17 00:49:04.409610 ignition[1031]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.8-arm64.raw" May 17 00:49:04.409610 ignition[1031]: INFO : files: op(f): [started] processing unit "nvidia.service" May 17 00:49:04.409610 ignition[1031]: INFO : files: op(f): [finished] processing unit "nvidia.service" May 17 00:49:04.409610 ignition[1031]: INFO : files: op(10): [started] processing unit "waagent.service" May 17 00:49:04.409610 ignition[1031]: INFO : files: op(10): [finished] processing unit "waagent.service" May 17 00:49:04.483603 kernel: audit: type=1130 audit(1747442944.427:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:04.427000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:04.422707 systemd[1]: Finished ignition-files.service. May 17 00:49:04.488522 ignition[1031]: INFO : files: op(11): [started] setting preset to enabled for "nvidia.service" May 17 00:49:04.488522 ignition[1031]: INFO : files: op(11): [finished] setting preset to enabled for "nvidia.service" May 17 00:49:04.488522 ignition[1031]: INFO : files: op(12): [started] setting preset to enabled for "waagent.service" May 17 00:49:04.488522 ignition[1031]: INFO : files: op(12): [finished] setting preset to enabled for "waagent.service" May 17 00:49:04.488522 ignition[1031]: INFO : files: createResultFile: createFiles: op(13): [started] writing file "/sysroot/etc/.ignition-result.json" May 17 00:49:04.488522 ignition[1031]: INFO : files: createResultFile: createFiles: op(13): [finished] writing file "/sysroot/etc/.ignition-result.json" May 17 00:49:04.488522 ignition[1031]: INFO : files: files passed May 17 00:49:04.488522 ignition[1031]: INFO : Ignition finished successfully May 17 00:49:04.493000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:04.493000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:04.522000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:04.452107 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 17 00:49:04.463212 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 17 00:49:04.577000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:04.577000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:04.588418 initrd-setup-root-after-ignition[1056]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 17 00:49:04.463938 systemd[1]: Starting ignition-quench.service... May 17 00:49:04.483786 systemd[1]: ignition-quench.service: Deactivated successfully. May 17 00:49:04.483894 systemd[1]: Finished ignition-quench.service. May 17 00:49:04.517108 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 17 00:49:04.522682 systemd[1]: Reached target ignition-complete.target. May 17 00:49:04.535738 systemd[1]: Starting initrd-parse-etc.service... May 17 00:49:04.639000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:04.569098 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 17 00:49:04.569202 systemd[1]: Finished initrd-parse-etc.service. May 17 00:49:04.577865 systemd[1]: Reached target initrd-fs.target. May 17 00:49:04.592917 systemd[1]: Reached target initrd.target. May 17 00:49:04.605694 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 17 00:49:04.606585 systemd[1]: Starting dracut-pre-pivot.service... May 17 00:49:04.694000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:04.634466 systemd[1]: Finished dracut-pre-pivot.service. May 17 00:49:04.640512 systemd[1]: Starting initrd-cleanup.service... May 17 00:49:04.659242 systemd[1]: Stopped target nss-lookup.target. May 17 00:49:04.665915 systemd[1]: Stopped target remote-cryptsetup.target. May 17 00:49:04.674781 systemd[1]: Stopped target timers.target. May 17 00:49:04.682743 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 17 00:49:04.682854 systemd[1]: Stopped dracut-pre-pivot.service. May 17 00:49:04.694556 systemd[1]: Stopped target initrd.target. May 17 00:49:04.702716 systemd[1]: Stopped target basic.target. May 17 00:49:04.711406 systemd[1]: Stopped target ignition-complete.target. May 17 00:49:04.720551 systemd[1]: Stopped target ignition-diskful.target. May 17 00:49:04.729451 systemd[1]: Stopped target initrd-root-device.target. May 17 00:49:04.801000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:04.739117 systemd[1]: Stopped target remote-fs.target. May 17 00:49:04.747578 systemd[1]: Stopped target remote-fs-pre.target. May 17 00:49:04.818000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:04.757883 systemd[1]: Stopped target sysinit.target. May 17 00:49:04.827000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:04.767466 systemd[1]: Stopped target local-fs.target. May 17 00:49:04.836000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:04.775805 systemd[1]: Stopped target local-fs-pre.target. May 17 00:49:04.844000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:04.783658 systemd[1]: Stopped target swap.target. May 17 00:49:04.792629 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 17 00:49:04.792731 systemd[1]: Stopped dracut-pre-mount.service. May 17 00:49:04.870638 iscsid[881]: iscsid shutting down. May 17 00:49:04.877236 ignition[1069]: INFO : Ignition 2.14.0 May 17 00:49:04.877236 ignition[1069]: INFO : Stage: umount May 17 00:49:04.877236 ignition[1069]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:49:04.877236 ignition[1069]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:49:04.882000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:04.909000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:04.801483 systemd[1]: Stopped target cryptsetup.target. May 17 00:49:04.928000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:04.932631 ignition[1069]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:49:04.932631 ignition[1069]: INFO : umount: umount passed May 17 00:49:04.932631 ignition[1069]: INFO : Ignition finished successfully May 17 00:49:04.943000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:04.952000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:04.810204 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 17 00:49:04.961000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:04.810291 systemd[1]: Stopped dracut-initqueue.service. May 17 00:49:04.818492 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 17 00:49:04.976000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:04.818587 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 17 00:49:04.827745 systemd[1]: ignition-files.service: Deactivated successfully. May 17 00:49:04.992000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:04.997000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:04.827822 systemd[1]: Stopped ignition-files.service. May 17 00:49:04.836297 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. May 17 00:49:04.836379 systemd[1]: Stopped flatcar-metadata-hostname.service. May 17 00:49:04.845873 systemd[1]: Stopping ignition-mount.service... May 17 00:49:04.859493 systemd[1]: Stopping iscsid.service... May 17 00:49:04.873762 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 17 00:49:04.873949 systemd[1]: Stopped kmod-static-nodes.service. May 17 00:49:04.883627 systemd[1]: Stopping sysroot-boot.service... May 17 00:49:05.060000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:04.900456 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 17 00:49:04.902919 systemd[1]: Stopped systemd-udev-trigger.service. May 17 00:49:04.910233 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 17 00:49:05.082000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:04.910367 systemd[1]: Stopped dracut-pre-trigger.service. May 17 00:49:05.092000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:05.092000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:04.933282 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 17 00:49:04.934222 systemd[1]: iscsid.service: Deactivated successfully. May 17 00:49:04.934334 systemd[1]: Stopped iscsid.service. May 17 00:49:04.944431 systemd[1]: ignition-mount.service: Deactivated successfully. May 17 00:49:04.944529 systemd[1]: Stopped ignition-mount.service. May 17 00:49:05.135000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:04.954223 systemd[1]: ignition-disks.service: Deactivated successfully. May 17 00:49:04.954285 systemd[1]: Stopped ignition-disks.service. May 17 00:49:05.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:04.961875 systemd[1]: ignition-kargs.service: Deactivated successfully. May 17 00:49:05.159000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:05.159000 audit: BPF prog-id=6 op=UNLOAD May 17 00:49:04.961917 systemd[1]: Stopped ignition-kargs.service. May 17 00:49:04.976700 systemd[1]: ignition-fetch.service: Deactivated successfully. May 17 00:49:05.176000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:04.976747 systemd[1]: Stopped ignition-fetch.service. May 17 00:49:05.192000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:04.992867 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 17 00:49:05.201000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:04.992916 systemd[1]: Stopped ignition-fetch-offline.service. May 17 00:49:05.211000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:04.997793 systemd[1]: Stopped target paths.target. May 17 00:49:05.007345 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 17 00:49:05.016548 systemd[1]: Stopped systemd-ask-password-console.path. May 17 00:49:05.021794 systemd[1]: Stopped target slices.target. May 17 00:49:05.240000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:05.034258 systemd[1]: Stopped target sockets.target. May 17 00:49:05.042926 systemd[1]: iscsid.socket: Deactivated successfully. May 17 00:49:05.042979 systemd[1]: Closed iscsid.socket. May 17 00:49:05.265000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:05.052657 systemd[1]: ignition-setup.service: Deactivated successfully. May 17 00:49:05.286190 kernel: hv_netvsc 002248b7-2251-0022-48b7-2251002248b7 eth0: Data path switched from VF: enP41466s1 May 17 00:49:05.281000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:05.052703 systemd[1]: Stopped ignition-setup.service. May 17 00:49:05.290000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:05.060765 systemd[1]: Stopping iscsiuio.service... May 17 00:49:05.074631 systemd[1]: iscsiuio.service: Deactivated successfully. May 17 00:49:05.074729 systemd[1]: Stopped iscsiuio.service. May 17 00:49:05.082414 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 17 00:49:05.316000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:05.082489 systemd[1]: Finished initrd-cleanup.service. May 17 00:49:05.326000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:05.326000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:05.092692 systemd[1]: Stopped target network.target. May 17 00:49:05.101585 systemd[1]: iscsiuio.socket: Deactivated successfully. May 17 00:49:05.101620 systemd[1]: Closed iscsiuio.socket. May 17 00:49:05.109905 systemd[1]: Stopping systemd-networkd.service... May 17 00:49:05.118263 systemd[1]: Stopping systemd-resolved.service... May 17 00:49:05.124942 systemd-networkd[869]: eth0: DHCPv6 lease lost May 17 00:49:05.351000 audit: BPF prog-id=9 op=UNLOAD May 17 00:49:05.130315 systemd[1]: systemd-networkd.service: Deactivated successfully. May 17 00:49:05.130398 systemd[1]: Stopped systemd-networkd.service. May 17 00:49:05.136299 systemd[1]: systemd-resolved.service: Deactivated successfully. May 17 00:49:05.136384 systemd[1]: Stopped systemd-resolved.service. May 17 00:49:05.150826 systemd[1]: sysroot-boot.service: Deactivated successfully. May 17 00:49:05.378000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:05.150908 systemd[1]: Stopped sysroot-boot.service. May 17 00:49:05.159382 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 17 00:49:05.159462 systemd[1]: Closed systemd-networkd.socket. May 17 00:49:05.168532 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 17 00:49:05.168582 systemd[1]: Stopped initrd-setup-root.service. May 17 00:49:05.177518 systemd[1]: Stopping network-cleanup.service... May 17 00:49:05.187770 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 17 00:49:05.187834 systemd[1]: Stopped parse-ip-for-networkd.service. May 17 00:49:05.193094 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 17 00:49:05.193147 systemd[1]: Stopped systemd-sysctl.service. May 17 00:49:05.206850 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 17 00:49:05.206895 systemd[1]: Stopped systemd-modules-load.service. May 17 00:49:05.217371 systemd[1]: Stopping systemd-udevd.service... May 17 00:49:05.222637 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 17 00:49:05.231433 systemd[1]: systemd-udevd.service: Deactivated successfully. May 17 00:49:05.231571 systemd[1]: Stopped systemd-udevd.service. May 17 00:49:05.240693 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 17 00:49:05.240723 systemd[1]: Closed systemd-udevd-control.socket. May 17 00:49:05.248679 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 17 00:49:05.248709 systemd[1]: Closed systemd-udevd-kernel.socket. May 17 00:49:05.256911 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 17 00:49:05.256964 systemd[1]: Stopped dracut-pre-udev.service. May 17 00:49:05.265457 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 17 00:49:05.448179 systemd-journald[276]: Received SIGTERM from PID 1 (n/a). May 17 00:49:05.265498 systemd[1]: Stopped dracut-cmdline.service. May 17 00:49:05.281474 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 17 00:49:05.281522 systemd[1]: Stopped dracut-cmdline-ask.service. May 17 00:49:05.294568 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 17 00:49:05.308434 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 17 00:49:05.308500 systemd[1]: Stopped systemd-vconsole-setup.service. May 17 00:49:05.316801 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 17 00:49:05.316890 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 17 00:49:05.370526 systemd[1]: network-cleanup.service: Deactivated successfully. May 17 00:49:05.370646 systemd[1]: Stopped network-cleanup.service. May 17 00:49:05.378410 systemd[1]: Reached target initrd-switch-root.target. May 17 00:49:05.389001 systemd[1]: Starting initrd-switch-root.service... May 17 00:49:05.407224 systemd[1]: Switching root. May 17 00:49:05.448514 systemd-journald[276]: Journal stopped May 17 00:49:15.790878 kernel: SELinux: Class mctp_socket not defined in policy. May 17 00:49:15.790898 kernel: SELinux: Class anon_inode not defined in policy. May 17 00:49:15.790908 kernel: SELinux: the above unknown classes and permissions will be allowed May 17 00:49:15.790917 kernel: SELinux: policy capability network_peer_controls=1 May 17 00:49:15.790925 kernel: SELinux: policy capability open_perms=1 May 17 00:49:15.790933 kernel: SELinux: policy capability extended_socket_class=1 May 17 00:49:15.790942 kernel: SELinux: policy capability always_check_network=0 May 17 00:49:15.790950 kernel: SELinux: policy capability cgroup_seclabel=1 May 17 00:49:15.790958 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 17 00:49:15.790966 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 17 00:49:15.790973 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 17 00:49:15.790982 kernel: kauditd_printk_skb: 42 callbacks suppressed May 17 00:49:15.790991 kernel: audit: type=1403 audit(1747442947.554:81): auid=4294967295 ses=4294967295 lsm=selinux res=1 May 17 00:49:15.791001 systemd[1]: Successfully loaded SELinux policy in 257.897ms. May 17 00:49:15.791012 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 102.471ms. May 17 00:49:15.791024 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 00:49:15.791033 systemd[1]: Detected virtualization microsoft. May 17 00:49:15.791042 systemd[1]: Detected architecture arm64. May 17 00:49:15.791053 systemd[1]: Detected first boot. May 17 00:49:15.791062 systemd[1]: Hostname set to . May 17 00:49:15.791071 systemd[1]: Initializing machine ID from random generator. May 17 00:49:15.791080 kernel: audit: type=1400 audit(1747442948.299:82): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:49:15.791091 kernel: audit: type=1400 audit(1747442948.303:83): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:49:15.791100 kernel: audit: type=1334 audit(1747442948.316:84): prog-id=10 op=LOAD May 17 00:49:15.791108 kernel: audit: type=1334 audit(1747442948.316:85): prog-id=10 op=UNLOAD May 17 00:49:15.791117 kernel: audit: type=1334 audit(1747442948.332:86): prog-id=11 op=LOAD May 17 00:49:15.791125 kernel: audit: type=1334 audit(1747442948.332:87): prog-id=11 op=UNLOAD May 17 00:49:15.791134 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 17 00:49:15.791143 kernel: audit: type=1400 audit(1747442949.506:88): avc: denied { associate } for pid=1102 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 17 00:49:15.791165 kernel: audit: type=1300 audit(1747442949.506:88): arch=c00000b7 syscall=5 success=yes exit=0 a0=400014588c a1=40000c6df8 a2=40000cd0c0 a3=32 items=0 ppid=1085 pid=1102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:15.791177 kernel: audit: type=1327 audit(1747442949.506:88): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:49:15.791186 systemd[1]: Populated /etc with preset unit settings. May 17 00:49:15.791196 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:49:15.791206 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:49:15.791216 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:49:15.791227 kernel: kauditd_printk_skb: 6 callbacks suppressed May 17 00:49:15.791236 kernel: audit: type=1334 audit(1747442955.092:90): prog-id=12 op=LOAD May 17 00:49:15.791244 kernel: audit: type=1334 audit(1747442955.092:91): prog-id=3 op=UNLOAD May 17 00:49:15.791252 kernel: audit: type=1334 audit(1747442955.097:92): prog-id=13 op=LOAD May 17 00:49:15.791262 kernel: audit: type=1334 audit(1747442955.103:93): prog-id=14 op=LOAD May 17 00:49:15.791273 kernel: audit: type=1334 audit(1747442955.103:94): prog-id=4 op=UNLOAD May 17 00:49:15.791282 kernel: audit: type=1334 audit(1747442955.103:95): prog-id=5 op=UNLOAD May 17 00:49:15.791290 kernel: audit: type=1334 audit(1747442955.109:96): prog-id=15 op=LOAD May 17 00:49:15.791299 kernel: audit: type=1334 audit(1747442955.109:97): prog-id=12 op=UNLOAD May 17 00:49:15.791309 kernel: audit: type=1334 audit(1747442955.114:98): prog-id=16 op=LOAD May 17 00:49:15.791317 kernel: audit: type=1334 audit(1747442955.120:99): prog-id=17 op=LOAD May 17 00:49:15.791326 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 17 00:49:15.791335 systemd[1]: Stopped initrd-switch-root.service. May 17 00:49:15.791344 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 17 00:49:15.791354 systemd[1]: Created slice system-addon\x2dconfig.slice. May 17 00:49:15.791363 systemd[1]: Created slice system-addon\x2drun.slice. May 17 00:49:15.791374 systemd[1]: Created slice system-getty.slice. May 17 00:49:15.791383 systemd[1]: Created slice system-modprobe.slice. May 17 00:49:15.791393 systemd[1]: Created slice system-serial\x2dgetty.slice. May 17 00:49:15.791402 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 17 00:49:15.791412 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 17 00:49:15.791421 systemd[1]: Created slice user.slice. May 17 00:49:15.791430 systemd[1]: Started systemd-ask-password-console.path. May 17 00:49:15.791439 systemd[1]: Started systemd-ask-password-wall.path. May 17 00:49:15.791448 systemd[1]: Set up automount boot.automount. May 17 00:49:15.791459 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 17 00:49:15.791469 systemd[1]: Stopped target initrd-switch-root.target. May 17 00:49:15.791478 systemd[1]: Stopped target initrd-fs.target. May 17 00:49:15.791487 systemd[1]: Stopped target initrd-root-fs.target. May 17 00:49:15.791496 systemd[1]: Reached target integritysetup.target. May 17 00:49:15.791505 systemd[1]: Reached target remote-cryptsetup.target. May 17 00:49:15.791515 systemd[1]: Reached target remote-fs.target. May 17 00:49:15.791524 systemd[1]: Reached target slices.target. May 17 00:49:15.791534 systemd[1]: Reached target swap.target. May 17 00:49:15.791543 systemd[1]: Reached target torcx.target. May 17 00:49:15.791552 systemd[1]: Reached target veritysetup.target. May 17 00:49:15.791561 systemd[1]: Listening on systemd-coredump.socket. May 17 00:49:15.791570 systemd[1]: Listening on systemd-initctl.socket. May 17 00:49:15.791580 systemd[1]: Listening on systemd-networkd.socket. May 17 00:49:15.791591 systemd[1]: Listening on systemd-udevd-control.socket. May 17 00:49:15.791600 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 00:49:15.791609 systemd[1]: Listening on systemd-userdbd.socket. May 17 00:49:15.791619 systemd[1]: Mounting dev-hugepages.mount... May 17 00:49:15.791628 systemd[1]: Mounting dev-mqueue.mount... May 17 00:49:15.791637 systemd[1]: Mounting media.mount... May 17 00:49:15.791647 systemd[1]: Mounting sys-kernel-debug.mount... May 17 00:49:15.791657 systemd[1]: Mounting sys-kernel-tracing.mount... May 17 00:49:15.791667 systemd[1]: Mounting tmp.mount... May 17 00:49:15.791677 systemd[1]: Starting flatcar-tmpfiles.service... May 17 00:49:15.791686 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:49:15.791695 systemd[1]: Starting kmod-static-nodes.service... May 17 00:49:15.791705 systemd[1]: Starting modprobe@configfs.service... May 17 00:49:15.791714 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:49:15.791723 systemd[1]: Starting modprobe@drm.service... May 17 00:49:15.791733 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:49:15.791742 systemd[1]: Starting modprobe@fuse.service... May 17 00:49:15.791753 systemd[1]: Starting modprobe@loop.service... May 17 00:49:15.791763 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 17 00:49:15.791772 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 17 00:49:15.791782 systemd[1]: Stopped systemd-fsck-root.service. May 17 00:49:15.791791 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 17 00:49:15.791800 systemd[1]: Stopped systemd-fsck-usr.service. May 17 00:49:15.791810 systemd[1]: Stopped systemd-journald.service. May 17 00:49:15.791819 systemd[1]: systemd-journald.service: Consumed 2.771s CPU time. May 17 00:49:15.791829 systemd[1]: Starting systemd-journald.service... May 17 00:49:15.791839 kernel: loop: module loaded May 17 00:49:15.791847 kernel: fuse: init (API version 7.34) May 17 00:49:15.791857 systemd[1]: Starting systemd-modules-load.service... May 17 00:49:15.791867 systemd[1]: Starting systemd-network-generator.service... May 17 00:49:15.791876 systemd[1]: Starting systemd-remount-fs.service... May 17 00:49:15.791885 systemd[1]: Starting systemd-udev-trigger.service... May 17 00:49:15.791894 systemd[1]: verity-setup.service: Deactivated successfully. May 17 00:49:15.791904 systemd[1]: Stopped verity-setup.service. May 17 00:49:15.791914 systemd[1]: Mounted dev-hugepages.mount. May 17 00:49:15.791924 systemd[1]: Mounted dev-mqueue.mount. May 17 00:49:15.791933 systemd[1]: Mounted media.mount. May 17 00:49:15.791946 systemd-journald[1209]: Journal started May 17 00:49:15.791984 systemd-journald[1209]: Runtime Journal (/run/log/journal/33441269bfde42c58003a9b80ee497e1) is 8.0M, max 78.5M, 70.5M free. May 17 00:49:07.554000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 17 00:49:08.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:49:08.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:49:08.316000 audit: BPF prog-id=10 op=LOAD May 17 00:49:08.316000 audit: BPF prog-id=10 op=UNLOAD May 17 00:49:08.332000 audit: BPF prog-id=11 op=LOAD May 17 00:49:08.332000 audit: BPF prog-id=11 op=UNLOAD May 17 00:49:09.506000 audit[1102]: AVC avc: denied { associate } for pid=1102 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 17 00:49:09.506000 audit[1102]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=400014588c a1=40000c6df8 a2=40000cd0c0 a3=32 items=0 ppid=1085 pid=1102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:09.506000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:49:09.515000 audit[1102]: AVC avc: denied { associate } for pid=1102 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 17 00:49:09.515000 audit[1102]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145965 a2=1ed a3=0 items=2 ppid=1085 pid=1102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:09.515000 audit: CWD cwd="/" May 17 00:49:09.515000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:49:09.515000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:49:09.515000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:49:15.092000 audit: BPF prog-id=12 op=LOAD May 17 00:49:15.092000 audit: BPF prog-id=3 op=UNLOAD May 17 00:49:15.097000 audit: BPF prog-id=13 op=LOAD May 17 00:49:15.103000 audit: BPF prog-id=14 op=LOAD May 17 00:49:15.103000 audit: BPF prog-id=4 op=UNLOAD May 17 00:49:15.103000 audit: BPF prog-id=5 op=UNLOAD May 17 00:49:15.109000 audit: BPF prog-id=15 op=LOAD May 17 00:49:15.109000 audit: BPF prog-id=12 op=UNLOAD May 17 00:49:15.114000 audit: BPF prog-id=16 op=LOAD May 17 00:49:15.120000 audit: BPF prog-id=17 op=LOAD May 17 00:49:15.120000 audit: BPF prog-id=13 op=UNLOAD May 17 00:49:15.120000 audit: BPF prog-id=14 op=UNLOAD May 17 00:49:15.126000 audit: BPF prog-id=18 op=LOAD May 17 00:49:15.126000 audit: BPF prog-id=15 op=UNLOAD May 17 00:49:15.132000 audit: BPF prog-id=19 op=LOAD May 17 00:49:15.143000 audit: BPF prog-id=20 op=LOAD May 17 00:49:15.143000 audit: BPF prog-id=16 op=UNLOAD May 17 00:49:15.143000 audit: BPF prog-id=17 op=UNLOAD May 17 00:49:15.144000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:15.168000 audit: BPF prog-id=18 op=UNLOAD May 17 00:49:15.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:15.172000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:15.643000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:15.659000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:15.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:15.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:15.677000 audit: BPF prog-id=21 op=LOAD May 17 00:49:15.677000 audit: BPF prog-id=22 op=LOAD May 17 00:49:15.677000 audit: BPF prog-id=23 op=LOAD May 17 00:49:15.677000 audit: BPF prog-id=19 op=UNLOAD May 17 00:49:15.677000 audit: BPF prog-id=20 op=UNLOAD May 17 00:49:15.769000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:15.788000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 17 00:49:15.788000 audit[1209]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=6 a1=ffffefe7e9a0 a2=4000 a3=1 items=0 ppid=1 pid=1209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:15.788000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 17 00:49:15.090597 systemd[1]: Queued start job for default target multi-user.target. May 17 00:49:09.461375 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2025-05-17T00:49:09Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:49:15.090609 systemd[1]: Unnecessary job was removed for dev-sda6.device. May 17 00:49:09.461677 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2025-05-17T00:49:09Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 17 00:49:15.144375 systemd[1]: systemd-journald.service: Deactivated successfully. May 17 00:49:09.461700 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2025-05-17T00:49:09Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 17 00:49:15.144750 systemd[1]: systemd-journald.service: Consumed 2.771s CPU time. May 17 00:49:09.461735 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2025-05-17T00:49:09Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 17 00:49:09.461745 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2025-05-17T00:49:09Z" level=debug msg="skipped missing lower profile" missing profile=oem May 17 00:49:09.461771 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2025-05-17T00:49:09Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 17 00:49:09.461783 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2025-05-17T00:49:09Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 17 00:49:09.461968 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2025-05-17T00:49:09Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 17 00:49:09.461999 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2025-05-17T00:49:09Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 17 00:49:09.462010 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2025-05-17T00:49:09Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 17 00:49:09.491238 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2025-05-17T00:49:09Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 17 00:49:09.491305 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2025-05-17T00:49:09Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 17 00:49:09.491338 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2025-05-17T00:49:09Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 17 00:49:09.491362 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2025-05-17T00:49:09Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 17 00:49:09.491383 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2025-05-17T00:49:09Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 17 00:49:09.491396 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2025-05-17T00:49:09Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 17 00:49:14.094600 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2025-05-17T00:49:14Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:49:14.094863 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2025-05-17T00:49:14Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:49:14.094965 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2025-05-17T00:49:14Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:49:14.095127 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2025-05-17T00:49:14Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:49:14.095195 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2025-05-17T00:49:14Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 17 00:49:14.095253 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2025-05-17T00:49:14Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 17 00:49:15.806037 systemd[1]: Started systemd-journald.service. May 17 00:49:15.806000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:15.806803 systemd[1]: Mounted sys-kernel-debug.mount. May 17 00:49:15.811647 systemd[1]: Mounted sys-kernel-tracing.mount. May 17 00:49:15.816855 systemd[1]: Mounted tmp.mount. May 17 00:49:15.820711 systemd[1]: Finished flatcar-tmpfiles.service. May 17 00:49:15.826000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:15.826623 systemd[1]: Finished kmod-static-nodes.service. May 17 00:49:15.831000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:15.831622 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 17 00:49:15.831755 systemd[1]: Finished modprobe@configfs.service. May 17 00:49:15.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:15.836000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:15.836777 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:49:15.836904 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:49:15.842000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:15.842000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:15.842816 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 00:49:15.842953 systemd[1]: Finished modprobe@drm.service. May 17 00:49:15.847000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:15.847000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:15.847566 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:49:15.847694 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:49:15.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:15.852000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:15.852729 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 17 00:49:15.852860 systemd[1]: Finished modprobe@fuse.service. May 17 00:49:15.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:15.857000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:15.857928 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:49:15.858056 systemd[1]: Finished modprobe@loop.service. May 17 00:49:15.862000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:15.862000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:15.862750 systemd[1]: Finished systemd-modules-load.service. May 17 00:49:15.867000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:15.867729 systemd[1]: Finished systemd-network-generator.service. May 17 00:49:15.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:15.873354 systemd[1]: Finished systemd-remount-fs.service. May 17 00:49:15.878000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:15.878935 systemd[1]: Reached target network-pre.target. May 17 00:49:15.884768 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 17 00:49:15.890439 systemd[1]: Mounting sys-kernel-config.mount... May 17 00:49:15.894371 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 17 00:49:15.925565 systemd[1]: Starting systemd-hwdb-update.service... May 17 00:49:15.930789 systemd[1]: Starting systemd-journal-flush.service... May 17 00:49:15.935093 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:49:15.936199 systemd[1]: Starting systemd-random-seed.service... May 17 00:49:15.940581 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:49:15.941709 systemd[1]: Starting systemd-sysctl.service... May 17 00:49:15.946605 systemd[1]: Starting systemd-sysusers.service... May 17 00:49:15.952642 systemd[1]: Finished systemd-udev-trigger.service. May 17 00:49:15.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:15.958485 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 17 00:49:15.963691 systemd[1]: Mounted sys-kernel-config.mount. May 17 00:49:15.969548 systemd[1]: Starting systemd-udev-settle.service... May 17 00:49:15.979591 udevadm[1223]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. May 17 00:49:15.982062 systemd-journald[1209]: Time spent on flushing to /var/log/journal/33441269bfde42c58003a9b80ee497e1 is 14.220ms for 1078 entries. May 17 00:49:15.982062 systemd-journald[1209]: System Journal (/var/log/journal/33441269bfde42c58003a9b80ee497e1) is 8.0M, max 2.6G, 2.6G free. May 17 00:49:16.062258 systemd-journald[1209]: Received client request to flush runtime journal. May 17 00:49:15.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:16.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:15.994186 systemd[1]: Finished systemd-random-seed.service. May 17 00:49:15.999424 systemd[1]: Reached target first-boot-complete.target. May 17 00:49:16.031873 systemd[1]: Finished systemd-sysctl.service. May 17 00:49:16.063304 systemd[1]: Finished systemd-journal-flush.service. May 17 00:49:16.068000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:16.465113 systemd[1]: Finished systemd-sysusers.service. May 17 00:49:16.469000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:17.013933 systemd[1]: Finished systemd-hwdb-update.service. May 17 00:49:17.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:17.019000 audit: BPF prog-id=24 op=LOAD May 17 00:49:17.019000 audit: BPF prog-id=25 op=LOAD May 17 00:49:17.019000 audit: BPF prog-id=7 op=UNLOAD May 17 00:49:17.019000 audit: BPF prog-id=8 op=UNLOAD May 17 00:49:17.020286 systemd[1]: Starting systemd-udevd.service... May 17 00:49:17.038373 systemd-udevd[1226]: Using default interface naming scheme 'v252'. May 17 00:49:17.229561 systemd[1]: Started systemd-udevd.service. May 17 00:49:17.238000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:17.239000 audit: BPF prog-id=26 op=LOAD May 17 00:49:17.241738 systemd[1]: Starting systemd-networkd.service... May 17 00:49:17.265426 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. May 17 00:49:17.307727 systemd[1]: Starting systemd-userdbd.service... May 17 00:49:17.306000 audit: BPF prog-id=27 op=LOAD May 17 00:49:17.306000 audit: BPF prog-id=28 op=LOAD May 17 00:49:17.306000 audit: BPF prog-id=29 op=LOAD May 17 00:49:17.320000 audit[1236]: AVC avc: denied { confidentiality } for pid=1236 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 17 00:49:17.334175 kernel: hv_vmbus: registering driver hyperv_fb May 17 00:49:17.334226 kernel: mousedev: PS/2 mouse device common for all mice May 17 00:49:17.347008 kernel: hyperv_fb: Synthvid Version major 3, minor 5 May 17 00:49:17.354172 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 May 17 00:49:17.360251 kernel: Console: switching to colour dummy device 80x25 May 17 00:49:17.364174 kernel: Console: switching to colour frame buffer device 128x48 May 17 00:49:17.389176 kernel: hv_vmbus: registering driver hv_balloon May 17 00:49:17.389249 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 May 17 00:49:17.389264 kernel: hv_utils: Registering HyperV Utility Driver May 17 00:49:17.389277 kernel: hv_balloon: Memory hot add disabled on ARM64 May 17 00:49:17.410656 kernel: hv_vmbus: registering driver hv_utils May 17 00:49:17.410817 kernel: hv_utils: Heartbeat IC version 3.0 May 17 00:49:17.410834 kernel: hv_utils: Shutdown IC version 3.2 May 17 00:49:17.320000 audit[1236]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaae4f0fad0 a1=aa2c a2=ffff95fe24b0 a3=aaaae4e6d010 items=12 ppid=1226 pid=1236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:17.320000 audit: CWD cwd="/" May 17 00:49:17.320000 audit: PATH item=0 name=(null) inode=6912 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:49:17.320000 audit: PATH item=1 name=(null) inode=11524 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:49:17.320000 audit: PATH item=2 name=(null) inode=11524 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:49:17.320000 audit: PATH item=3 name=(null) inode=11525 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:49:17.320000 audit: PATH item=4 name=(null) inode=11524 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:49:17.320000 audit: PATH item=5 name=(null) inode=11526 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:49:17.320000 audit: PATH item=6 name=(null) inode=11524 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:49:17.320000 audit: PATH item=7 name=(null) inode=11527 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:49:17.320000 audit: PATH item=8 name=(null) inode=11524 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:49:17.320000 audit: PATH item=9 name=(null) inode=11528 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:49:17.320000 audit: PATH item=10 name=(null) inode=11524 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:49:17.320000 audit: PATH item=11 name=(null) inode=11529 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:49:17.320000 audit: PROCTITLE proctitle="(udev-worker)" May 17 00:49:17.402990 systemd[1]: Started systemd-userdbd.service. May 17 00:49:17.414192 kernel: hv_utils: TimeSync IC version 4.0 May 17 00:49:17.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:17.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:17.815060 systemd-networkd[1244]: lo: Link UP May 17 00:49:17.815067 systemd-networkd[1244]: lo: Gained carrier May 17 00:49:17.815456 systemd-networkd[1244]: Enumeration completed May 17 00:49:17.815545 systemd[1]: Started systemd-networkd.service. May 17 00:49:17.821208 systemd[1]: Starting systemd-networkd-wait-online.service... May 17 00:49:17.842477 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 00:49:17.843152 systemd-networkd[1244]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 00:49:17.847610 systemd[1]: Finished systemd-udev-settle.service. May 17 00:49:17.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:17.853130 systemd[1]: Starting lvm2-activation-early.service... May 17 00:49:17.893996 kernel: mlx5_core a1fa:00:02.0 enP41466s1: Link up May 17 00:49:17.921016 kernel: hv_netvsc 002248b7-2251-0022-48b7-2251002248b7 eth0: Data path switched to VF: enP41466s1 May 17 00:49:17.922787 systemd-networkd[1244]: enP41466s1: Link UP May 17 00:49:17.923160 systemd-networkd[1244]: eth0: Link UP May 17 00:49:17.923171 systemd-networkd[1244]: eth0: Gained carrier May 17 00:49:17.927465 systemd-networkd[1244]: enP41466s1: Gained carrier May 17 00:49:17.937129 systemd-networkd[1244]: eth0: DHCPv4 address 10.200.20.28/24, gateway 10.200.20.1 acquired from 168.63.129.16 May 17 00:49:18.116211 lvm[1303]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 00:49:18.139971 systemd[1]: Finished lvm2-activation-early.service. May 17 00:49:18.144000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:18.145253 systemd[1]: Reached target cryptsetup.target. May 17 00:49:18.150887 systemd[1]: Starting lvm2-activation.service... May 17 00:49:18.154851 lvm[1304]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 00:49:18.172863 systemd[1]: Finished lvm2-activation.service. May 17 00:49:18.176000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:18.177428 systemd[1]: Reached target local-fs-pre.target. May 17 00:49:18.181961 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 17 00:49:18.182001 systemd[1]: Reached target local-fs.target. May 17 00:49:18.186347 systemd[1]: Reached target machines.target. May 17 00:49:18.191679 systemd[1]: Starting ldconfig.service... May 17 00:49:18.196197 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:49:18.196260 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:49:18.197302 systemd[1]: Starting systemd-boot-update.service... May 17 00:49:18.202316 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 17 00:49:18.208455 systemd[1]: Starting systemd-machine-id-commit.service... May 17 00:49:18.214006 systemd[1]: Starting systemd-sysext.service... May 17 00:49:18.343606 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1306 (bootctl) May 17 00:49:18.345064 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 17 00:49:18.426425 systemd[1]: Unmounting usr-share-oem.mount... May 17 00:49:18.582368 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 17 00:49:18.587000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:18.627175 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 17 00:49:18.627362 systemd[1]: Unmounted usr-share-oem.mount. May 17 00:49:18.674999 kernel: loop0: detected capacity change from 0 to 203944 May 17 00:49:18.689306 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 17 00:49:18.689874 systemd[1]: Finished systemd-machine-id-commit.service. May 17 00:49:18.695000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:18.718004 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 17 00:49:18.740012 kernel: loop1: detected capacity change from 0 to 203944 May 17 00:49:18.746949 (sd-sysext)[1318]: Using extensions 'kubernetes'. May 17 00:49:18.747571 (sd-sysext)[1318]: Merged extensions into '/usr'. May 17 00:49:18.764212 systemd[1]: Mounting usr-share-oem.mount... May 17 00:49:18.768318 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:49:18.769522 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:49:18.774405 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:49:18.779641 systemd[1]: Starting modprobe@loop.service... May 17 00:49:18.784205 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:49:18.784339 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:49:18.786621 systemd[1]: Mounted usr-share-oem.mount. May 17 00:49:18.791110 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:49:18.791241 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:49:18.795000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:18.795000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:18.796679 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:49:18.796803 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:49:18.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:18.801000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:18.802278 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:49:18.802399 systemd[1]: Finished modprobe@loop.service. May 17 00:49:18.805000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:18.805000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:18.806973 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:49:18.807087 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:49:18.808227 systemd[1]: Finished systemd-sysext.service. May 17 00:49:18.811000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:18.813767 systemd[1]: Starting ensure-sysext.service... May 17 00:49:18.818902 systemd[1]: Starting systemd-tmpfiles-setup.service... May 17 00:49:18.827676 systemd[1]: Reloading. May 17 00:49:18.840866 systemd-fsck[1314]: fsck.fat 4.2 (2021-01-31) May 17 00:49:18.840866 systemd-fsck[1314]: /dev/sda1: 236 files, 117182/258078 clusters May 17 00:49:18.866149 /usr/lib/systemd/system-generators/torcx-generator[1345]: time="2025-05-17T00:49:18Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:49:18.866180 /usr/lib/systemd/system-generators/torcx-generator[1345]: time="2025-05-17T00:49:18Z" level=info msg="torcx already run" May 17 00:49:18.956926 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:49:18.956945 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:49:18.972028 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:49:18.995029 systemd-tmpfiles[1325]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 17 00:49:19.033000 audit: BPF prog-id=30 op=LOAD May 17 00:49:19.033000 audit: BPF prog-id=21 op=UNLOAD May 17 00:49:19.033000 audit: BPF prog-id=31 op=LOAD May 17 00:49:19.033000 audit: BPF prog-id=32 op=LOAD May 17 00:49:19.033000 audit: BPF prog-id=22 op=UNLOAD May 17 00:49:19.033000 audit: BPF prog-id=23 op=UNLOAD May 17 00:49:19.033000 audit: BPF prog-id=33 op=LOAD May 17 00:49:19.033000 audit: BPF prog-id=27 op=UNLOAD May 17 00:49:19.033000 audit: BPF prog-id=34 op=LOAD May 17 00:49:19.033000 audit: BPF prog-id=35 op=LOAD May 17 00:49:19.033000 audit: BPF prog-id=28 op=UNLOAD May 17 00:49:19.033000 audit: BPF prog-id=29 op=UNLOAD May 17 00:49:19.035000 audit: BPF prog-id=36 op=LOAD May 17 00:49:19.035000 audit: BPF prog-id=37 op=LOAD May 17 00:49:19.035000 audit: BPF prog-id=24 op=UNLOAD May 17 00:49:19.035000 audit: BPF prog-id=25 op=UNLOAD May 17 00:49:19.036000 audit: BPF prog-id=38 op=LOAD May 17 00:49:19.036000 audit: BPF prog-id=26 op=UNLOAD May 17 00:49:19.039069 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 17 00:49:19.044000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:19.049904 systemd[1]: Mounting boot.mount... May 17 00:49:19.057321 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:49:19.058493 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:49:19.064545 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:49:19.069901 systemd[1]: Starting modprobe@loop.service... May 17 00:49:19.073852 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:49:19.073988 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:49:19.076107 systemd[1]: Mounted boot.mount. May 17 00:49:19.080327 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:49:19.080459 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:49:19.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:19.084000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:19.085989 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:49:19.086108 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:49:19.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:19.090000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:19.091559 systemd-tmpfiles[1325]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 17 00:49:19.091698 systemd[1]: Finished systemd-boot-update.service. May 17 00:49:19.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:19.096914 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:49:19.097044 systemd[1]: Finished modprobe@loop.service. May 17 00:49:19.100000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:19.100000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:19.103172 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:49:19.104367 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:49:19.109257 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:49:19.114404 systemd[1]: Starting modprobe@loop.service... May 17 00:49:19.119364 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:49:19.119488 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:49:19.120326 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:49:19.120468 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:49:19.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:19.124000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:19.125422 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:49:19.125536 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:49:19.129000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:19.129000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:19.130579 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:49:19.130701 systemd[1]: Finished modprobe@loop.service. May 17 00:49:19.134000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:19.134000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:19.137613 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:49:19.138922 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:49:19.144057 systemd[1]: Starting modprobe@drm.service... May 17 00:49:19.148918 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:49:19.150845 systemd-tmpfiles[1325]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 17 00:49:19.154205 systemd[1]: Starting modprobe@loop.service... May 17 00:49:19.157937 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:49:19.158081 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:49:19.158966 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:49:19.159124 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:49:19.162000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:19.162000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:19.163969 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 00:49:19.164117 systemd[1]: Finished modprobe@drm.service. May 17 00:49:19.167000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:19.167000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:19.168862 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:49:19.168985 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:49:19.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:19.173000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:19.174365 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:49:19.174478 systemd[1]: Finished modprobe@loop.service. May 17 00:49:19.178000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:19.178000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:19.179288 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:49:19.179375 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:49:19.180610 systemd[1]: Finished ensure-sysext.service. May 17 00:49:19.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:19.706639 systemd[1]: Finished systemd-tmpfiles-setup.service. May 17 00:49:19.711000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:19.712891 systemd[1]: Starting audit-rules.service... May 17 00:49:19.717724 systemd[1]: Starting clean-ca-certificates.service... May 17 00:49:19.723206 systemd[1]: Starting systemd-journal-catalog-update.service... May 17 00:49:19.727000 audit: BPF prog-id=39 op=LOAD May 17 00:49:19.729810 systemd[1]: Starting systemd-resolved.service... May 17 00:49:19.734000 audit: BPF prog-id=40 op=LOAD May 17 00:49:19.736691 systemd[1]: Starting systemd-timesyncd.service... May 17 00:49:19.742094 systemd[1]: Starting systemd-update-utmp.service... May 17 00:49:19.787273 systemd[1]: Finished clean-ca-certificates.service. May 17 00:49:19.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:19.792241 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 00:49:19.822000 audit[1425]: SYSTEM_BOOT pid=1425 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 17 00:49:19.826136 systemd[1]: Finished systemd-update-utmp.service. May 17 00:49:19.830000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:19.832142 systemd[1]: Started systemd-timesyncd.service. May 17 00:49:19.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:19.837106 systemd[1]: Reached target time-set.target. May 17 00:49:19.863068 systemd-networkd[1244]: eth0: Gained IPv6LL May 17 00:49:19.864589 systemd[1]: Finished systemd-networkd-wait-online.service. May 17 00:49:19.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:19.870626 systemd-resolved[1422]: Positive Trust Anchors: May 17 00:49:19.870640 systemd-resolved[1422]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 00:49:19.870666 systemd-resolved[1422]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 00:49:19.909460 systemd[1]: Finished systemd-journal-catalog-update.service. May 17 00:49:19.913000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:19.932539 systemd-resolved[1422]: Using system hostname 'ci-3510.3.7-n-b41680b403'. May 17 00:49:19.934046 systemd[1]: Started systemd-resolved.service. May 17 00:49:19.938000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:49:19.938864 systemd[1]: Reached target network.target. May 17 00:49:19.943418 systemd[1]: Reached target network-online.target. May 17 00:49:19.948310 systemd[1]: Reached target nss-lookup.target. May 17 00:49:20.001000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 17 00:49:20.001000 audit[1440]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffde6517a0 a2=420 a3=0 items=0 ppid=1419 pid=1440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:49:20.001000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 17 00:49:20.002954 augenrules[1440]: No rules May 17 00:49:20.003756 systemd[1]: Finished audit-rules.service. May 17 00:49:20.161677 systemd-timesyncd[1424]: Contacted time server 173.11.101.155:123 (0.flatcar.pool.ntp.org). May 17 00:49:20.161744 systemd-timesyncd[1424]: Initial clock synchronization to Sat 2025-05-17 00:49:20.161511 UTC. May 17 00:49:25.578499 ldconfig[1305]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 17 00:49:25.592950 systemd[1]: Finished ldconfig.service. May 17 00:49:25.599252 systemd[1]: Starting systemd-update-done.service... May 17 00:49:25.632376 systemd[1]: Finished systemd-update-done.service. May 17 00:49:25.637659 systemd[1]: Reached target sysinit.target. May 17 00:49:25.642308 systemd[1]: Started motdgen.path. May 17 00:49:25.646115 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 17 00:49:25.652403 systemd[1]: Started logrotate.timer. May 17 00:49:25.656681 systemd[1]: Started mdadm.timer. May 17 00:49:25.660379 systemd[1]: Started systemd-tmpfiles-clean.timer. May 17 00:49:25.665224 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 17 00:49:25.665254 systemd[1]: Reached target paths.target. May 17 00:49:25.669656 systemd[1]: Reached target timers.target. May 17 00:49:25.675342 systemd[1]: Listening on dbus.socket. May 17 00:49:25.680408 systemd[1]: Starting docker.socket... May 17 00:49:25.699165 systemd[1]: Listening on sshd.socket. May 17 00:49:25.703741 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:49:25.704191 systemd[1]: Listening on docker.socket. May 17 00:49:25.708631 systemd[1]: Reached target sockets.target. May 17 00:49:25.713071 systemd[1]: Reached target basic.target. May 17 00:49:25.717209 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 00:49:25.717234 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 00:49:25.718169 systemd[1]: Starting containerd.service... May 17 00:49:25.723068 systemd[1]: Starting dbus.service... May 17 00:49:25.727392 systemd[1]: Starting enable-oem-cloudinit.service... May 17 00:49:25.732712 systemd[1]: Starting extend-filesystems.service... May 17 00:49:25.739936 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 17 00:49:25.741072 systemd[1]: Starting kubelet.service... May 17 00:49:25.745790 systemd[1]: Starting motdgen.service... May 17 00:49:25.750700 systemd[1]: Started nvidia.service. May 17 00:49:25.756257 systemd[1]: Starting ssh-key-proc-cmdline.service... May 17 00:49:25.761789 systemd[1]: Starting sshd-keygen.service... May 17 00:49:25.767727 systemd[1]: Starting systemd-logind.service... May 17 00:49:25.772033 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:49:25.772093 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 17 00:49:25.772438 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 17 00:49:25.773035 systemd[1]: Starting update-engine.service... May 17 00:49:25.778239 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 17 00:49:25.788083 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 17 00:49:25.788261 systemd[1]: Finished ssh-key-proc-cmdline.service. May 17 00:49:25.816087 jq[1450]: false May 17 00:49:25.816448 jq[1467]: true May 17 00:49:25.832078 extend-filesystems[1451]: Found loop1 May 17 00:49:25.832078 extend-filesystems[1451]: Found sda May 17 00:49:25.832078 extend-filesystems[1451]: Found sda1 May 17 00:49:25.832078 extend-filesystems[1451]: Found sda2 May 17 00:49:25.832078 extend-filesystems[1451]: Found sda3 May 17 00:49:25.832078 extend-filesystems[1451]: Found usr May 17 00:49:25.832078 extend-filesystems[1451]: Found sda4 May 17 00:49:25.832078 extend-filesystems[1451]: Found sda6 May 17 00:49:25.832078 extend-filesystems[1451]: Found sda7 May 17 00:49:25.832078 extend-filesystems[1451]: Found sda9 May 17 00:49:25.832078 extend-filesystems[1451]: Checking size of /dev/sda9 May 17 00:49:25.840455 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 17 00:49:25.886531 jq[1471]: true May 17 00:49:25.840629 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 17 00:49:25.876640 systemd-logind[1462]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) May 17 00:49:25.877227 systemd-logind[1462]: New seat seat0. May 17 00:49:25.891822 systemd[1]: motdgen.service: Deactivated successfully. May 17 00:49:25.892029 systemd[1]: Finished motdgen.service. May 17 00:49:25.931559 extend-filesystems[1451]: Old size kept for /dev/sda9 May 17 00:49:25.942667 extend-filesystems[1451]: Found sr0 May 17 00:49:25.936808 systemd[1]: extend-filesystems.service: Deactivated successfully. May 17 00:49:25.937005 systemd[1]: Finished extend-filesystems.service. May 17 00:49:25.978454 env[1476]: time="2025-05-17T00:49:25.978134854Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 17 00:49:26.029215 dbus-daemon[1449]: [system] SELinux support is enabled May 17 00:49:26.029389 systemd[1]: Started dbus.service. May 17 00:49:26.035421 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 17 00:49:26.035444 systemd[1]: Reached target system-config.target. May 17 00:49:26.044402 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 17 00:49:26.044427 systemd[1]: Reached target user-config.target. May 17 00:49:26.053011 dbus-daemon[1449]: [system] Successfully activated service 'org.freedesktop.systemd1' May 17 00:49:26.053221 systemd[1]: Started systemd-logind.service. May 17 00:49:26.058238 bash[1502]: Updated "/home/core/.ssh/authorized_keys" May 17 00:49:26.060337 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 17 00:49:26.087485 env[1476]: time="2025-05-17T00:49:26.087399856Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 17 00:49:26.087600 env[1476]: time="2025-05-17T00:49:26.087576896Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 17 00:49:26.100834 env[1476]: time="2025-05-17T00:49:26.100786618Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.182-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 17 00:49:26.100834 env[1476]: time="2025-05-17T00:49:26.100828818Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 17 00:49:26.101124 env[1476]: time="2025-05-17T00:49:26.101095937Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 00:49:26.101124 env[1476]: time="2025-05-17T00:49:26.101119617Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 17 00:49:26.101181 env[1476]: time="2025-05-17T00:49:26.101132697Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 17 00:49:26.101181 env[1476]: time="2025-05-17T00:49:26.101144137Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 17 00:49:26.101237 env[1476]: time="2025-05-17T00:49:26.101217816Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 17 00:49:26.101470 env[1476]: time="2025-05-17T00:49:26.101448056Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 17 00:49:26.101594 env[1476]: time="2025-05-17T00:49:26.101570135Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 00:49:26.101594 env[1476]: time="2025-05-17T00:49:26.101590215Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 17 00:49:26.101651 env[1476]: time="2025-05-17T00:49:26.101639695Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 17 00:49:26.101675 env[1476]: time="2025-05-17T00:49:26.101651895Z" level=info msg="metadata content store policy set" policy=shared May 17 00:49:26.114820 systemd[1]: nvidia.service: Deactivated successfully. May 17 00:49:26.132992 env[1476]: time="2025-05-17T00:49:26.130553292Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 17 00:49:26.132992 env[1476]: time="2025-05-17T00:49:26.130600252Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 17 00:49:26.132992 env[1476]: time="2025-05-17T00:49:26.130613012Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 17 00:49:26.132992 env[1476]: time="2025-05-17T00:49:26.130645012Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 17 00:49:26.132992 env[1476]: time="2025-05-17T00:49:26.130659812Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 17 00:49:26.132992 env[1476]: time="2025-05-17T00:49:26.130673572Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 17 00:49:26.132992 env[1476]: time="2025-05-17T00:49:26.130685692Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 17 00:49:26.132992 env[1476]: time="2025-05-17T00:49:26.131023331Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 17 00:49:26.132992 env[1476]: time="2025-05-17T00:49:26.131041091Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 17 00:49:26.132992 env[1476]: time="2025-05-17T00:49:26.131056971Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 17 00:49:26.132992 env[1476]: time="2025-05-17T00:49:26.131069851Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 17 00:49:26.132992 env[1476]: time="2025-05-17T00:49:26.131082371Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 17 00:49:26.132992 env[1476]: time="2025-05-17T00:49:26.131213930Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 17 00:49:26.132992 env[1476]: time="2025-05-17T00:49:26.131284890Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 17 00:49:26.133422 env[1476]: time="2025-05-17T00:49:26.131494130Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 17 00:49:26.133422 env[1476]: time="2025-05-17T00:49:26.131516529Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 17 00:49:26.133422 env[1476]: time="2025-05-17T00:49:26.131529009Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 17 00:49:26.133422 env[1476]: time="2025-05-17T00:49:26.131571289Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 17 00:49:26.133422 env[1476]: time="2025-05-17T00:49:26.131583409Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 17 00:49:26.133422 env[1476]: time="2025-05-17T00:49:26.131594329Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 17 00:49:26.133422 env[1476]: time="2025-05-17T00:49:26.131605089Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 17 00:49:26.133422 env[1476]: time="2025-05-17T00:49:26.131617729Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 17 00:49:26.133422 env[1476]: time="2025-05-17T00:49:26.131628769Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 17 00:49:26.133422 env[1476]: time="2025-05-17T00:49:26.131639649Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 17 00:49:26.133422 env[1476]: time="2025-05-17T00:49:26.131650449Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 17 00:49:26.133422 env[1476]: time="2025-05-17T00:49:26.131662649Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 17 00:49:26.133422 env[1476]: time="2025-05-17T00:49:26.131769049Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 17 00:49:26.133422 env[1476]: time="2025-05-17T00:49:26.131783009Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 17 00:49:26.133422 env[1476]: time="2025-05-17T00:49:26.131794049Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 17 00:49:26.133016 systemd[1]: Started containerd.service. May 17 00:49:26.133808 env[1476]: time="2025-05-17T00:49:26.131804329Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 17 00:49:26.133808 env[1476]: time="2025-05-17T00:49:26.131817809Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 17 00:49:26.133808 env[1476]: time="2025-05-17T00:49:26.131829769Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 17 00:49:26.133808 env[1476]: time="2025-05-17T00:49:26.131845289Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 17 00:49:26.133808 env[1476]: time="2025-05-17T00:49:26.131879448Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 17 00:49:26.133904 env[1476]: time="2025-05-17T00:49:26.132086368Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 17 00:49:26.133904 env[1476]: time="2025-05-17T00:49:26.132139888Z" level=info msg="Connect containerd service" May 17 00:49:26.133904 env[1476]: time="2025-05-17T00:49:26.132171408Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 17 00:49:26.133904 env[1476]: time="2025-05-17T00:49:26.132653206Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 17 00:49:26.133904 env[1476]: time="2025-05-17T00:49:26.132867806Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 17 00:49:26.133904 env[1476]: time="2025-05-17T00:49:26.132901766Z" level=info msg=serving... address=/run/containerd/containerd.sock May 17 00:49:26.133904 env[1476]: time="2025-05-17T00:49:26.132941925Z" level=info msg="containerd successfully booted in 0.166753s" May 17 00:49:26.150427 env[1476]: time="2025-05-17T00:49:26.137871911Z" level=info msg="Start subscribing containerd event" May 17 00:49:26.150427 env[1476]: time="2025-05-17T00:49:26.138072551Z" level=info msg="Start recovering state" May 17 00:49:26.150427 env[1476]: time="2025-05-17T00:49:26.138150310Z" level=info msg="Start event monitor" May 17 00:49:26.150427 env[1476]: time="2025-05-17T00:49:26.138169230Z" level=info msg="Start snapshots syncer" May 17 00:49:26.150427 env[1476]: time="2025-05-17T00:49:26.138178710Z" level=info msg="Start cni network conf syncer for default" May 17 00:49:26.150427 env[1476]: time="2025-05-17T00:49:26.138185910Z" level=info msg="Start streaming server" May 17 00:49:26.612714 update_engine[1465]: I0517 00:49:26.598904 1465 main.cc:92] Flatcar Update Engine starting May 17 00:49:26.660752 systemd[1]: Started update-engine.service. May 17 00:49:26.662255 update_engine[1465]: I0517 00:49:26.662130 1465 update_check_scheduler.cc:74] Next update check in 11m16s May 17 00:49:26.667997 systemd[1]: Started locksmithd.service. May 17 00:49:26.731399 systemd[1]: Started kubelet.service. May 17 00:49:27.172514 kubelet[1547]: E0517 00:49:27.172474 1547 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:49:27.174668 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:49:27.174786 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:49:27.883361 locksmithd[1544]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 17 00:49:29.278621 sshd_keygen[1466]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 17 00:49:29.294804 systemd[1]: Finished sshd-keygen.service. May 17 00:49:29.301318 systemd[1]: Starting issuegen.service... May 17 00:49:29.306558 systemd[1]: Started waagent.service. May 17 00:49:29.311040 systemd[1]: issuegen.service: Deactivated successfully. May 17 00:49:29.311198 systemd[1]: Finished issuegen.service. May 17 00:49:29.316543 systemd[1]: Starting systemd-user-sessions.service... May 17 00:49:29.384056 systemd[1]: Finished systemd-user-sessions.service. May 17 00:49:29.390536 systemd[1]: Started getty@tty1.service. May 17 00:49:29.395856 systemd[1]: Started serial-getty@ttyAMA0.service. May 17 00:49:29.400733 systemd[1]: Reached target getty.target. May 17 00:49:29.405005 systemd[1]: Reached target multi-user.target. May 17 00:49:29.410806 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 17 00:49:29.422429 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 17 00:49:29.422588 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 17 00:49:29.428155 systemd[1]: Startup finished in 719ms (kernel) + 12.484s (initrd) + 22.121s (userspace) = 35.325s. May 17 00:49:30.039971 login[1570]: pam_lastlog(login:session): file /var/log/lastlog is locked/write May 17 00:49:30.042283 login[1571]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) May 17 00:49:30.096184 systemd[1]: Created slice user-500.slice. May 17 00:49:30.097283 systemd[1]: Starting user-runtime-dir@500.service... May 17 00:49:30.100409 systemd-logind[1462]: New session 2 of user core. May 17 00:49:30.134459 systemd[1]: Finished user-runtime-dir@500.service. May 17 00:49:30.135823 systemd[1]: Starting user@500.service... May 17 00:49:30.166321 (systemd)[1574]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 17 00:49:30.330168 systemd[1574]: Queued start job for default target default.target. May 17 00:49:30.330627 systemd[1574]: Reached target paths.target. May 17 00:49:30.330646 systemd[1574]: Reached target sockets.target. May 17 00:49:30.330657 systemd[1574]: Reached target timers.target. May 17 00:49:30.330666 systemd[1574]: Reached target basic.target. May 17 00:49:30.330704 systemd[1574]: Reached target default.target. May 17 00:49:30.330727 systemd[1574]: Startup finished in 158ms. May 17 00:49:30.331078 systemd[1]: Started user@500.service. May 17 00:49:30.332845 systemd[1]: Started session-2.scope. May 17 00:49:31.040413 login[1570]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) May 17 00:49:31.044809 systemd[1]: Started session-1.scope. May 17 00:49:31.045307 systemd-logind[1462]: New session 1 of user core. May 17 00:49:37.425565 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 17 00:49:37.425734 systemd[1]: Stopped kubelet.service. May 17 00:49:37.427122 systemd[1]: Starting kubelet.service... May 17 00:49:43.369124 systemd[1]: Started kubelet.service. May 17 00:49:43.413549 kubelet[1600]: E0517 00:49:43.413499 1600 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:49:43.416169 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:49:43.416288 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:49:45.453692 waagent[1568]: 2025-05-17T00:49:45.453582Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 May 17 00:49:45.460522 waagent[1568]: 2025-05-17T00:49:45.460447Z INFO Daemon Daemon OS: flatcar 3510.3.7 May 17 00:49:45.465190 waagent[1568]: 2025-05-17T00:49:45.465131Z INFO Daemon Daemon Python: 3.9.16 May 17 00:49:45.474989 waagent[1568]: 2025-05-17T00:49:45.469717Z INFO Daemon Daemon Run daemon May 17 00:49:45.474989 waagent[1568]: 2025-05-17T00:49:45.474495Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.7' May 17 00:49:45.491558 waagent[1568]: 2025-05-17T00:49:45.491442Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. May 17 00:49:45.507205 waagent[1568]: 2025-05-17T00:49:45.507085Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' May 17 00:49:45.517430 waagent[1568]: 2025-05-17T00:49:45.517367Z INFO Daemon Daemon cloud-init is enabled: False May 17 00:49:45.522775 waagent[1568]: 2025-05-17T00:49:45.522716Z INFO Daemon Daemon Using waagent for provisioning May 17 00:49:45.528678 waagent[1568]: 2025-05-17T00:49:45.528617Z INFO Daemon Daemon Activate resource disk May 17 00:49:45.533700 waagent[1568]: 2025-05-17T00:49:45.533644Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb May 17 00:49:45.548218 waagent[1568]: 2025-05-17T00:49:45.548155Z INFO Daemon Daemon Found device: None May 17 00:49:45.553093 waagent[1568]: 2025-05-17T00:49:45.553033Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology May 17 00:49:45.561790 waagent[1568]: 2025-05-17T00:49:45.561730Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 May 17 00:49:45.574177 waagent[1568]: 2025-05-17T00:49:45.574115Z INFO Daemon Daemon Clean protocol and wireserver endpoint May 17 00:49:45.580750 waagent[1568]: 2025-05-17T00:49:45.580691Z INFO Daemon Daemon Running default provisioning handler May 17 00:49:45.593903 waagent[1568]: 2025-05-17T00:49:45.593790Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. May 17 00:49:45.608770 waagent[1568]: 2025-05-17T00:49:45.608656Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' May 17 00:49:45.619010 waagent[1568]: 2025-05-17T00:49:45.618934Z INFO Daemon Daemon cloud-init is enabled: False May 17 00:49:45.624021 waagent[1568]: 2025-05-17T00:49:45.623931Z INFO Daemon Daemon Copying ovf-env.xml May 17 00:49:45.798782 waagent[1568]: 2025-05-17T00:49:45.798407Z INFO Daemon Daemon Successfully mounted dvd May 17 00:49:46.107158 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. May 17 00:49:46.140483 waagent[1568]: 2025-05-17T00:49:46.140352Z INFO Daemon Daemon Detect protocol endpoint May 17 00:49:46.145806 waagent[1568]: 2025-05-17T00:49:46.145744Z INFO Daemon Daemon Clean protocol and wireserver endpoint May 17 00:49:46.152077 waagent[1568]: 2025-05-17T00:49:46.152017Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler May 17 00:49:46.158755 waagent[1568]: 2025-05-17T00:49:46.158695Z INFO Daemon Daemon Test for route to 168.63.129.16 May 17 00:49:46.164954 waagent[1568]: 2025-05-17T00:49:46.164899Z INFO Daemon Daemon Route to 168.63.129.16 exists May 17 00:49:46.170092 waagent[1568]: 2025-05-17T00:49:46.170035Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 May 17 00:49:46.560696 waagent[1568]: 2025-05-17T00:49:46.560571Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 May 17 00:49:46.568046 waagent[1568]: 2025-05-17T00:49:46.567996Z INFO Daemon Daemon Wire protocol version:2012-11-30 May 17 00:49:46.573964 waagent[1568]: 2025-05-17T00:49:46.573901Z INFO Daemon Daemon Server preferred version:2015-04-05 May 17 00:49:48.422326 waagent[1568]: 2025-05-17T00:49:48.422177Z INFO Daemon Daemon Initializing goal state during protocol detection May 17 00:49:48.436918 waagent[1568]: 2025-05-17T00:49:48.436846Z INFO Daemon Daemon Forcing an update of the goal state.. May 17 00:49:48.443273 waagent[1568]: 2025-05-17T00:49:48.443214Z INFO Daemon Daemon Fetching goal state [incarnation 1] May 17 00:49:48.603426 waagent[1568]: 2025-05-17T00:49:48.603296Z INFO Daemon Daemon Found private key matching thumbprint 22B0F00007253D22083F5106127D1B24F7F3D9E5 May 17 00:49:48.611927 waagent[1568]: 2025-05-17T00:49:48.611864Z INFO Daemon Daemon Certificate with thumbprint EB1E156BCD737946D210E7F01891CD1F4D0AE343 has no matching private key. May 17 00:49:48.621606 waagent[1568]: 2025-05-17T00:49:48.621544Z INFO Daemon Daemon Fetch goal state completed May 17 00:49:48.673685 waagent[1568]: 2025-05-17T00:49:48.673598Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: eb7a67a1-f0fc-4628-94f3-54f74b0a002b New eTag: 11742357199984292002] May 17 00:49:48.684508 waagent[1568]: 2025-05-17T00:49:48.684441Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob May 17 00:49:48.699454 waagent[1568]: 2025-05-17T00:49:48.699400Z INFO Daemon Daemon Starting provisioning May 17 00:49:48.704470 waagent[1568]: 2025-05-17T00:49:48.704411Z INFO Daemon Daemon Handle ovf-env.xml. May 17 00:49:48.709220 waagent[1568]: 2025-05-17T00:49:48.709163Z INFO Daemon Daemon Set hostname [ci-3510.3.7-n-b41680b403] May 17 00:49:48.745740 waagent[1568]: 2025-05-17T00:49:48.745606Z INFO Daemon Daemon Publish hostname [ci-3510.3.7-n-b41680b403] May 17 00:49:48.752273 waagent[1568]: 2025-05-17T00:49:48.752205Z INFO Daemon Daemon Examine /proc/net/route for primary interface May 17 00:49:48.758555 waagent[1568]: 2025-05-17T00:49:48.758497Z INFO Daemon Daemon Primary interface is [eth0] May 17 00:49:48.774473 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. May 17 00:49:48.774643 systemd[1]: Stopped systemd-networkd-wait-online.service. May 17 00:49:48.774696 systemd[1]: Stopping systemd-networkd-wait-online.service... May 17 00:49:48.774947 systemd[1]: Stopping systemd-networkd.service... May 17 00:49:48.778028 systemd-networkd[1244]: eth0: DHCPv6 lease lost May 17 00:49:48.779591 systemd[1]: systemd-networkd.service: Deactivated successfully. May 17 00:49:48.779751 systemd[1]: Stopped systemd-networkd.service. May 17 00:49:48.781732 systemd[1]: Starting systemd-networkd.service... May 17 00:49:48.808373 systemd-networkd[1629]: enP41466s1: Link UP May 17 00:49:48.808384 systemd-networkd[1629]: enP41466s1: Gained carrier May 17 00:49:48.809234 systemd-networkd[1629]: eth0: Link UP May 17 00:49:48.809245 systemd-networkd[1629]: eth0: Gained carrier May 17 00:49:48.809552 systemd-networkd[1629]: lo: Link UP May 17 00:49:48.809561 systemd-networkd[1629]: lo: Gained carrier May 17 00:49:48.809789 systemd-networkd[1629]: eth0: Gained IPv6LL May 17 00:49:48.810924 systemd-networkd[1629]: Enumeration completed May 17 00:49:48.811045 systemd[1]: Started systemd-networkd.service. May 17 00:49:48.812359 systemd-networkd[1629]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 00:49:48.812775 systemd[1]: Starting systemd-networkd-wait-online.service... May 17 00:49:48.817381 waagent[1568]: 2025-05-17T00:49:48.817220Z INFO Daemon Daemon Create user account if not exists May 17 00:49:48.829738 waagent[1568]: 2025-05-17T00:49:48.823696Z INFO Daemon Daemon User core already exists, skip useradd May 17 00:49:48.830085 waagent[1568]: 2025-05-17T00:49:48.829914Z INFO Daemon Daemon Configure sudoer May 17 00:49:48.834708 waagent[1568]: 2025-05-17T00:49:48.834642Z INFO Daemon Daemon Configure sshd May 17 00:49:48.838818 waagent[1568]: 2025-05-17T00:49:48.838760Z INFO Daemon Daemon Deploy ssh public key. May 17 00:49:48.845084 systemd-networkd[1629]: eth0: DHCPv4 address 10.200.20.28/24, gateway 10.200.20.1 acquired from 168.63.129.16 May 17 00:49:48.848481 systemd[1]: Finished systemd-networkd-wait-online.service. May 17 00:49:50.002598 waagent[1568]: 2025-05-17T00:49:50.002532Z INFO Daemon Daemon Provisioning complete May 17 00:49:50.020698 waagent[1568]: 2025-05-17T00:49:50.020638Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping May 17 00:49:50.027273 waagent[1568]: 2025-05-17T00:49:50.027210Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. May 17 00:49:50.037941 waagent[1568]: 2025-05-17T00:49:50.037879Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent May 17 00:49:50.335258 waagent[1638]: 2025-05-17T00:49:50.335095Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent May 17 00:49:50.335952 waagent[1638]: 2025-05-17T00:49:50.335887Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 00:49:50.336105 waagent[1638]: 2025-05-17T00:49:50.336056Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 00:49:50.351258 waagent[1638]: 2025-05-17T00:49:50.351184Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. May 17 00:49:50.351438 waagent[1638]: 2025-05-17T00:49:50.351389Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] May 17 00:49:50.416105 waagent[1638]: 2025-05-17T00:49:50.415945Z INFO ExtHandler ExtHandler Found private key matching thumbprint 22B0F00007253D22083F5106127D1B24F7F3D9E5 May 17 00:49:50.416313 waagent[1638]: 2025-05-17T00:49:50.416260Z INFO ExtHandler ExtHandler Certificate with thumbprint EB1E156BCD737946D210E7F01891CD1F4D0AE343 has no matching private key. May 17 00:49:50.416526 waagent[1638]: 2025-05-17T00:49:50.416481Z INFO ExtHandler ExtHandler Fetch goal state completed May 17 00:49:50.430217 waagent[1638]: 2025-05-17T00:49:50.430164Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: bef08b95-5c01-4f97-a54b-398a8c0fff5a New eTag: 11742357199984292002] May 17 00:49:50.430736 waagent[1638]: 2025-05-17T00:49:50.430678Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob May 17 00:49:50.511649 waagent[1638]: 2025-05-17T00:49:50.511504Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.7; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; May 17 00:49:50.521639 waagent[1638]: 2025-05-17T00:49:50.521565Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1638 May 17 00:49:50.525353 waagent[1638]: 2025-05-17T00:49:50.525290Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.7', '', 'Flatcar Container Linux by Kinvolk'] May 17 00:49:50.526701 waagent[1638]: 2025-05-17T00:49:50.526641Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules May 17 00:49:50.620613 waagent[1638]: 2025-05-17T00:49:50.620558Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service May 17 00:49:50.621188 waagent[1638]: 2025-05-17T00:49:50.621132Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup May 17 00:49:50.629056 waagent[1638]: 2025-05-17T00:49:50.629006Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now May 17 00:49:50.629627 waagent[1638]: 2025-05-17T00:49:50.629573Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' May 17 00:49:50.630880 waagent[1638]: 2025-05-17T00:49:50.630819Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] May 17 00:49:50.632282 waagent[1638]: 2025-05-17T00:49:50.632215Z INFO ExtHandler ExtHandler Starting env monitor service. May 17 00:49:50.632645 waagent[1638]: 2025-05-17T00:49:50.632574Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 00:49:50.633044 waagent[1638]: 2025-05-17T00:49:50.632945Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 00:49:50.633649 waagent[1638]: 2025-05-17T00:49:50.633584Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. May 17 00:49:50.633956 waagent[1638]: 2025-05-17T00:49:50.633900Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: May 17 00:49:50.633956 waagent[1638]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT May 17 00:49:50.633956 waagent[1638]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 May 17 00:49:50.633956 waagent[1638]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 May 17 00:49:50.633956 waagent[1638]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 May 17 00:49:50.633956 waagent[1638]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 May 17 00:49:50.633956 waagent[1638]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 May 17 00:49:50.636055 waagent[1638]: 2025-05-17T00:49:50.635879Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. May 17 00:49:50.636839 waagent[1638]: 2025-05-17T00:49:50.636771Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 00:49:50.637047 waagent[1638]: 2025-05-17T00:49:50.636966Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 00:49:50.637604 waagent[1638]: 2025-05-17T00:49:50.637537Z INFO EnvHandler ExtHandler Configure routes May 17 00:49:50.637753 waagent[1638]: 2025-05-17T00:49:50.637706Z INFO EnvHandler ExtHandler Gateway:None May 17 00:49:50.637868 waagent[1638]: 2025-05-17T00:49:50.637826Z INFO EnvHandler ExtHandler Routes:None May 17 00:49:50.638749 waagent[1638]: 2025-05-17T00:49:50.638689Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread May 17 00:49:50.638899 waagent[1638]: 2025-05-17T00:49:50.638832Z INFO ExtHandler ExtHandler Start Extension Telemetry service. May 17 00:49:50.639788 waagent[1638]: 2025-05-17T00:49:50.639696Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True May 17 00:49:50.639969 waagent[1638]: 2025-05-17T00:49:50.639903Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. May 17 00:49:50.640300 waagent[1638]: 2025-05-17T00:49:50.640235Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread May 17 00:49:50.652407 waagent[1638]: 2025-05-17T00:49:50.652348Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) May 17 00:49:50.653077 waagent[1638]: 2025-05-17T00:49:50.653030Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required May 17 00:49:50.654092 waagent[1638]: 2025-05-17T00:49:50.654035Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' May 17 00:49:50.677594 waagent[1638]: 2025-05-17T00:49:50.677469Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1629' May 17 00:49:50.717769 waagent[1638]: 2025-05-17T00:49:50.717703Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. May 17 00:49:50.792184 waagent[1638]: 2025-05-17T00:49:50.792054Z INFO MonitorHandler ExtHandler Network interfaces: May 17 00:49:50.792184 waagent[1638]: Executing ['ip', '-a', '-o', 'link']: May 17 00:49:50.792184 waagent[1638]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 May 17 00:49:50.792184 waagent[1638]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:b7:22:51 brd ff:ff:ff:ff:ff:ff May 17 00:49:50.792184 waagent[1638]: 3: enP41466s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:b7:22:51 brd ff:ff:ff:ff:ff:ff\ altname enP41466p0s2 May 17 00:49:50.792184 waagent[1638]: Executing ['ip', '-4', '-a', '-o', 'address']: May 17 00:49:50.792184 waagent[1638]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever May 17 00:49:50.792184 waagent[1638]: 2: eth0 inet 10.200.20.28/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever May 17 00:49:50.792184 waagent[1638]: Executing ['ip', '-6', '-a', '-o', 'address']: May 17 00:49:50.792184 waagent[1638]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever May 17 00:49:50.792184 waagent[1638]: 2: eth0 inet6 fe80::222:48ff:feb7:2251/64 scope link \ valid_lft forever preferred_lft forever May 17 00:49:51.029526 waagent[1638]: 2025-05-17T00:49:51.029398Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.13.1.1 -- exiting May 17 00:49:52.042334 waagent[1568]: 2025-05-17T00:49:52.042218Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running May 17 00:49:52.047017 waagent[1568]: 2025-05-17T00:49:52.046947Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.13.1.1 to be the latest agent May 17 00:49:53.306719 waagent[1671]: 2025-05-17T00:49:53.306619Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.13.1.1) May 17 00:49:53.308096 waagent[1671]: 2025-05-17T00:49:53.308033Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.7 May 17 00:49:53.308235 waagent[1671]: 2025-05-17T00:49:53.308188Z INFO ExtHandler ExtHandler Python: 3.9.16 May 17 00:49:53.308366 waagent[1671]: 2025-05-17T00:49:53.308320Z INFO ExtHandler ExtHandler CPU Arch: aarch64 May 17 00:49:53.321665 waagent[1671]: 2025-05-17T00:49:53.321548Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.7; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; Arch: aarch64; systemd: True; systemd_version: systemd 252 (252); LISDrivers: Absent; logrotate: logrotate 3.20.1; May 17 00:49:53.322095 waagent[1671]: 2025-05-17T00:49:53.322041Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 00:49:53.322263 waagent[1671]: 2025-05-17T00:49:53.322218Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 00:49:53.322461 waagent[1671]: 2025-05-17T00:49:53.322414Z INFO ExtHandler ExtHandler Initializing the goal state... May 17 00:49:53.335594 waagent[1671]: 2025-05-17T00:49:53.335531Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] May 17 00:49:53.347266 waagent[1671]: 2025-05-17T00:49:53.347216Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.164 May 17 00:49:53.348229 waagent[1671]: 2025-05-17T00:49:53.348171Z INFO ExtHandler May 17 00:49:53.348374 waagent[1671]: 2025-05-17T00:49:53.348328Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 030b5437-7add-4e8b-a952-22d6462d5092 eTag: 11742357199984292002 source: Fabric] May 17 00:49:53.349107 waagent[1671]: 2025-05-17T00:49:53.349052Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. May 17 00:49:53.350289 waagent[1671]: 2025-05-17T00:49:53.350231Z INFO ExtHandler May 17 00:49:53.350417 waagent[1671]: 2025-05-17T00:49:53.350373Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] May 17 00:49:53.357139 waagent[1671]: 2025-05-17T00:49:53.357086Z INFO ExtHandler ExtHandler Downloading artifacts profile blob May 17 00:49:53.357573 waagent[1671]: 2025-05-17T00:49:53.357522Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required May 17 00:49:53.374551 waagent[1671]: 2025-05-17T00:49:53.374495Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. May 17 00:49:53.442000 waagent[1671]: 2025-05-17T00:49:53.441861Z INFO ExtHandler Downloaded certificate {'thumbprint': 'EB1E156BCD737946D210E7F01891CD1F4D0AE343', 'hasPrivateKey': False} May 17 00:49:53.442943 waagent[1671]: 2025-05-17T00:49:53.442881Z INFO ExtHandler Downloaded certificate {'thumbprint': '22B0F00007253D22083F5106127D1B24F7F3D9E5', 'hasPrivateKey': True} May 17 00:49:53.444046 waagent[1671]: 2025-05-17T00:49:53.443970Z INFO ExtHandler Fetch goal state from WireServer completed May 17 00:49:53.444892 waagent[1671]: 2025-05-17T00:49:53.444833Z INFO ExtHandler ExtHandler Goal state initialization completed. May 17 00:49:53.462164 waagent[1671]: 2025-05-17T00:49:53.462064Z INFO ExtHandler ExtHandler OpenSSL version: OpenSSL 3.0.15 3 Sep 2024 (Library: OpenSSL 3.0.15 3 Sep 2024) May 17 00:49:53.469626 waagent[1671]: 2025-05-17T00:49:53.469525Z INFO ExtHandler ExtHandler Using iptables [version 1.8.8] to manage firewall rules May 17 00:49:53.472972 waagent[1671]: 2025-05-17T00:49:53.472869Z INFO ExtHandler ExtHandler Did not find a legacy firewall rule: ['iptables', '-w', '-t', 'security', '-C', 'OUTPUT', '-d', '168.63.129.16', '-p', 'tcp', '-m', 'conntrack', '--ctstate', 'INVALID,NEW', '-j', 'ACCEPT'] May 17 00:49:53.473185 waagent[1671]: 2025-05-17T00:49:53.473131Z INFO ExtHandler ExtHandler Checking state of the firewall May 17 00:49:53.600120 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 17 00:49:53.600291 systemd[1]: Stopped kubelet.service. May 17 00:49:53.601578 systemd[1]: Starting kubelet.service... May 17 00:49:53.621519 waagent[1671]: 2025-05-17T00:49:53.621398Z INFO ExtHandler ExtHandler Created firewall rules for Azure Fabric: May 17 00:49:53.621519 waagent[1671]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) May 17 00:49:53.621519 waagent[1671]: pkts bytes target prot opt in out source destination May 17 00:49:53.621519 waagent[1671]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) May 17 00:49:53.621519 waagent[1671]: pkts bytes target prot opt in out source destination May 17 00:49:53.621519 waagent[1671]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) May 17 00:49:53.621519 waagent[1671]: pkts bytes target prot opt in out source destination May 17 00:49:53.621519 waagent[1671]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 May 17 00:49:53.621519 waagent[1671]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 May 17 00:49:53.621519 waagent[1671]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW May 17 00:49:53.622948 waagent[1671]: 2025-05-17T00:49:53.622888Z INFO ExtHandler ExtHandler Setting up persistent firewall rules May 17 00:49:53.626128 waagent[1671]: 2025-05-17T00:49:53.626020Z INFO ExtHandler ExtHandler The firewalld service is not present on the system May 17 00:49:53.626484 waagent[1671]: 2025-05-17T00:49:53.626428Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service May 17 00:49:53.626906 waagent[1671]: 2025-05-17T00:49:53.626851Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup May 17 00:49:53.635848 waagent[1671]: 2025-05-17T00:49:53.635792Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now May 17 00:49:53.636561 waagent[1671]: 2025-05-17T00:49:53.636500Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' May 17 00:49:53.645025 waagent[1671]: 2025-05-17T00:49:53.644933Z INFO ExtHandler ExtHandler WALinuxAgent-2.13.1.1 running as process 1671 May 17 00:49:53.648459 waagent[1671]: 2025-05-17T00:49:53.648391Z INFO ExtHandler ExtHandler [CGI] Cgroups is not currently supported on ['flatcar', '3510.3.7', '', 'Flatcar Container Linux by Kinvolk'] May 17 00:49:53.649434 waagent[1671]: 2025-05-17T00:49:53.649374Z INFO ExtHandler ExtHandler [CGI] Agent will reset the quotas in case cgroup usage went from enabled to disabled May 17 00:49:53.650504 waagent[1671]: 2025-05-17T00:49:53.650448Z INFO ExtHandler ExtHandler [CGI] Agent cgroups enabled: False May 17 00:49:53.653493 waagent[1671]: 2025-05-17T00:49:53.653429Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: 1. configuration enabled [True], 2. cgroups v1 enabled [False] OR cgroups v2 is in use and v2 resource limiting configuration enabled [False], 3. python supported: [True] May 17 00:49:53.654906 waagent[1671]: 2025-05-17T00:49:53.654850Z INFO ExtHandler ExtHandler Starting env monitor service. May 17 00:49:53.655441 waagent[1671]: 2025-05-17T00:49:53.655390Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 00:49:53.655666 waagent[1671]: 2025-05-17T00:49:53.655619Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 00:49:53.656319 waagent[1671]: 2025-05-17T00:49:53.656262Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. May 17 00:49:53.656709 waagent[1671]: 2025-05-17T00:49:53.656655Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: May 17 00:49:53.656709 waagent[1671]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT May 17 00:49:53.656709 waagent[1671]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 May 17 00:49:53.656709 waagent[1671]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 May 17 00:49:53.656709 waagent[1671]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 May 17 00:49:53.656709 waagent[1671]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 May 17 00:49:53.656709 waagent[1671]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 May 17 00:49:53.659388 waagent[1671]: 2025-05-17T00:49:53.659252Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. May 17 00:49:53.660196 waagent[1671]: 2025-05-17T00:49:53.660140Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 00:49:53.660443 waagent[1671]: 2025-05-17T00:49:53.660389Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 00:49:53.661063 waagent[1671]: 2025-05-17T00:49:53.661003Z INFO EnvHandler ExtHandler Configure routes May 17 00:49:53.661298 waagent[1671]: 2025-05-17T00:49:53.661249Z INFO EnvHandler ExtHandler Gateway:None May 17 00:49:53.661494 waagent[1671]: 2025-05-17T00:49:53.661450Z INFO EnvHandler ExtHandler Routes:None May 17 00:49:53.664450 waagent[1671]: 2025-05-17T00:49:53.664392Z INFO ExtHandler ExtHandler Start Extension Telemetry service. May 17 00:49:53.665008 waagent[1671]: 2025-05-17T00:49:53.664164Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread May 17 00:49:53.665654 waagent[1671]: 2025-05-17T00:49:53.665606Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. May 17 00:49:53.668546 waagent[1671]: 2025-05-17T00:49:53.665505Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True May 17 00:49:53.669263 waagent[1671]: 2025-05-17T00:49:53.669133Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread May 17 00:49:53.678281 waagent[1671]: 2025-05-17T00:49:53.678222Z INFO ExtHandler ExtHandler Downloading agent manifest May 17 00:49:53.693433 waagent[1671]: 2025-05-17T00:49:53.693363Z INFO ExtHandler ExtHandler May 17 00:49:53.699042 waagent[1671]: 2025-05-17T00:49:53.698819Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: ca0198c3-f4bc-4552-a875-1875f485ec21 correlation 228f9284-9faf-4a91-8045-14e4de06fab0 created: 2025-05-17T00:48:11.937088Z] May 17 00:49:53.701595 waagent[1671]: 2025-05-17T00:49:53.701530Z INFO MonitorHandler ExtHandler Network interfaces: May 17 00:49:53.701595 waagent[1671]: Executing ['ip', '-a', '-o', 'link']: May 17 00:49:53.701595 waagent[1671]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 May 17 00:49:53.701595 waagent[1671]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:b7:22:51 brd ff:ff:ff:ff:ff:ff May 17 00:49:53.701595 waagent[1671]: 3: enP41466s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:b7:22:51 brd ff:ff:ff:ff:ff:ff\ altname enP41466p0s2 May 17 00:49:53.701595 waagent[1671]: Executing ['ip', '-4', '-a', '-o', 'address']: May 17 00:49:53.701595 waagent[1671]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever May 17 00:49:53.701595 waagent[1671]: 2: eth0 inet 10.200.20.28/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever May 17 00:49:53.701595 waagent[1671]: Executing ['ip', '-6', '-a', '-o', 'address']: May 17 00:49:53.701595 waagent[1671]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever May 17 00:49:53.701595 waagent[1671]: 2: eth0 inet6 fe80::222:48ff:feb7:2251/64 scope link \ valid_lft forever preferred_lft forever May 17 00:49:53.702446 waagent[1671]: 2025-05-17T00:49:53.702385Z INFO EnvHandler ExtHandler Using iptables [version 1.8.8] to manage firewall rules May 17 00:49:53.707694 waagent[1671]: 2025-05-17T00:49:53.707608Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. May 17 00:49:53.710225 waagent[1671]: 2025-05-17T00:49:53.710164Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 16 ms] May 17 00:49:53.724873 systemd[1]: Started kubelet.service. May 17 00:49:53.745102 waagent[1671]: 2025-05-17T00:49:53.745032Z INFO ExtHandler ExtHandler Looking for existing remote access users. May 17 00:49:53.747554 waagent[1671]: 2025-05-17T00:49:53.747491Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.13.1.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 4FD7F518-D7DF-4CFD-9D14-B39E55278A28;UpdateGSErrors: 0;AutoUpdate: 1;UpdateMode: SelfUpdate;] May 17 00:49:53.851316 kubelet[1715]: E0517 00:49:53.851229 1715 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:49:53.853331 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:49:53.853445 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:49:54.145134 waagent[1671]: 2025-05-17T00:49:54.145024Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 May 17 00:49:58.808605 systemd[1]: Created slice system-sshd.slice. May 17 00:49:58.810107 systemd[1]: Started sshd@0-10.200.20.28:22-10.200.16.10:53996.service. May 17 00:49:59.431076 sshd[1725]: Accepted publickey for core from 10.200.16.10 port 53996 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:49:59.447581 sshd[1725]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:49:59.451840 systemd[1]: Started session-3.scope. May 17 00:49:59.452150 systemd-logind[1462]: New session 3 of user core. May 17 00:49:59.850116 systemd[1]: Started sshd@1-10.200.20.28:22-10.200.16.10:54012.service. May 17 00:50:00.333688 sshd[1730]: Accepted publickey for core from 10.200.16.10 port 54012 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:50:00.335302 sshd[1730]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:50:00.339431 systemd[1]: Started session-4.scope. May 17 00:50:00.340001 systemd-logind[1462]: New session 4 of user core. May 17 00:50:00.699370 sshd[1730]: pam_unix(sshd:session): session closed for user core May 17 00:50:00.701811 systemd[1]: sshd@1-10.200.20.28:22-10.200.16.10:54012.service: Deactivated successfully. May 17 00:50:00.702492 systemd[1]: session-4.scope: Deactivated successfully. May 17 00:50:00.702997 systemd-logind[1462]: Session 4 logged out. Waiting for processes to exit. May 17 00:50:00.703860 systemd-logind[1462]: Removed session 4. May 17 00:50:00.778079 systemd[1]: Started sshd@2-10.200.20.28:22-10.200.16.10:54026.service. May 17 00:50:01.252027 sshd[1736]: Accepted publickey for core from 10.200.16.10 port 54026 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:50:01.253311 sshd[1736]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:50:01.257835 systemd[1]: Started session-5.scope. May 17 00:50:01.258182 systemd-logind[1462]: New session 5 of user core. May 17 00:50:01.594894 sshd[1736]: pam_unix(sshd:session): session closed for user core May 17 00:50:01.597577 systemd[1]: sshd@2-10.200.20.28:22-10.200.16.10:54026.service: Deactivated successfully. May 17 00:50:01.598256 systemd[1]: session-5.scope: Deactivated successfully. May 17 00:50:01.598774 systemd-logind[1462]: Session 5 logged out. Waiting for processes to exit. May 17 00:50:01.599548 systemd-logind[1462]: Removed session 5. May 17 00:50:01.680328 systemd[1]: Started sshd@3-10.200.20.28:22-10.200.16.10:54036.service. May 17 00:50:02.159193 sshd[1742]: Accepted publickey for core from 10.200.16.10 port 54036 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:50:02.160729 sshd[1742]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:50:02.164854 systemd[1]: Started session-6.scope. May 17 00:50:02.165439 systemd-logind[1462]: New session 6 of user core. May 17 00:50:02.524024 sshd[1742]: pam_unix(sshd:session): session closed for user core May 17 00:50:02.526830 systemd-logind[1462]: Session 6 logged out. Waiting for processes to exit. May 17 00:50:02.526832 systemd[1]: session-6.scope: Deactivated successfully. May 17 00:50:02.527816 systemd[1]: sshd@3-10.200.20.28:22-10.200.16.10:54036.service: Deactivated successfully. May 17 00:50:02.528568 systemd-logind[1462]: Removed session 6. May 17 00:50:02.604525 systemd[1]: Started sshd@4-10.200.20.28:22-10.200.16.10:54050.service. May 17 00:50:03.079294 sshd[1748]: Accepted publickey for core from 10.200.16.10 port 54050 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:50:03.080519 sshd[1748]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:50:03.084819 systemd[1]: Started session-7.scope. May 17 00:50:03.085141 systemd-logind[1462]: New session 7 of user core. May 17 00:50:03.654772 sudo[1751]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 17 00:50:03.655382 sudo[1751]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:50:03.697177 dbus-daemon[1449]: avc: received setenforce notice (enforcing=1) May 17 00:50:03.699103 sudo[1751]: pam_unix(sudo:session): session closed for user root May 17 00:50:03.792812 sshd[1748]: pam_unix(sshd:session): session closed for user core May 17 00:50:03.796458 systemd[1]: sshd@4-10.200.20.28:22-10.200.16.10:54050.service: Deactivated successfully. May 17 00:50:03.796779 systemd-logind[1462]: Session 7 logged out. Waiting for processes to exit. May 17 00:50:03.797256 systemd[1]: session-7.scope: Deactivated successfully. May 17 00:50:03.798182 systemd-logind[1462]: Removed session 7. May 17 00:50:03.872861 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. May 17 00:50:03.873002 systemd[1]: Stopped kubelet.service. May 17 00:50:03.874492 systemd[1]: Starting kubelet.service... May 17 00:50:03.875656 systemd[1]: Started sshd@5-10.200.20.28:22-10.200.16.10:54058.service. May 17 00:50:04.171260 systemd[1]: Started kubelet.service. May 17 00:50:04.207508 kubelet[1761]: E0517 00:50:04.207456 1761 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:50:04.209468 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:50:04.209589 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:50:04.361127 sshd[1756]: Accepted publickey for core from 10.200.16.10 port 54058 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:50:04.362504 sshd[1756]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:50:04.366716 systemd[1]: Started session-8.scope. May 17 00:50:04.367075 systemd-logind[1462]: New session 8 of user core. May 17 00:50:04.635678 sudo[1768]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 17 00:50:04.635889 sudo[1768]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:50:04.638333 sudo[1768]: pam_unix(sudo:session): session closed for user root May 17 00:50:04.642469 sudo[1767]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 17 00:50:04.642660 sudo[1767]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:50:04.650887 systemd[1]: Stopping audit-rules.service... May 17 00:50:04.650000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 17 00:50:04.654118 auditctl[1771]: No rules May 17 00:50:04.655809 kernel: kauditd_printk_skb: 142 callbacks suppressed May 17 00:50:04.655866 kernel: audit: type=1305 audit(1747443004.650:223): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 17 00:50:04.656159 systemd[1]: audit-rules.service: Deactivated successfully. May 17 00:50:04.656330 systemd[1]: Stopped audit-rules.service. May 17 00:50:04.657872 systemd[1]: Starting audit-rules.service... May 17 00:50:04.650000 audit[1771]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffcfa404b0 a2=420 a3=0 items=0 ppid=1 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:04.676396 augenrules[1788]: No rules May 17 00:50:04.677375 systemd[1]: Finished audit-rules.service. May 17 00:50:04.689994 kernel: audit: type=1300 audit(1747443004.650:223): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffcfa404b0 a2=420 a3=0 items=0 ppid=1 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:04.650000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 17 00:50:04.690327 sudo[1767]: pam_unix(sudo:session): session closed for user root May 17 00:50:04.697564 kernel: audit: type=1327 audit(1747443004.650:223): proctitle=2F7362696E2F617564697463746C002D44 May 17 00:50:04.697656 kernel: audit: type=1131 audit(1747443004.655:224): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:04.655000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:04.676000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:04.728576 kernel: audit: type=1130 audit(1747443004.676:225): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:04.728721 kernel: audit: type=1106 audit(1747443004.689:226): pid=1767 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:50:04.689000 audit[1767]: USER_END pid=1767 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:50:04.689000 audit[1767]: CRED_DISP pid=1767 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:50:04.764132 kernel: audit: type=1104 audit(1747443004.689:227): pid=1767 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:50:04.782992 sshd[1756]: pam_unix(sshd:session): session closed for user core May 17 00:50:04.782000 audit[1756]: USER_END pid=1756 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:04.806381 systemd[1]: sshd@5-10.200.20.28:22-10.200.16.10:54058.service: Deactivated successfully. May 17 00:50:04.807061 systemd[1]: session-8.scope: Deactivated successfully. May 17 00:50:04.782000 audit[1756]: CRED_DISP pid=1756 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:04.825055 kernel: audit: type=1106 audit(1747443004.782:228): pid=1756 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:04.825123 kernel: audit: type=1104 audit(1747443004.782:229): pid=1756 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:04.805000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.28:22-10.200.16.10:54058 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:04.825600 systemd-logind[1462]: Session 8 logged out. Waiting for processes to exit. May 17 00:50:04.826115 kernel: audit: type=1131 audit(1747443004.805:230): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.28:22-10.200.16.10:54058 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:04.843890 systemd-logind[1462]: Removed session 8. May 17 00:50:04.863167 systemd[1]: Started sshd@6-10.200.20.28:22-10.200.16.10:54060.service. May 17 00:50:04.862000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.28:22-10.200.16.10:54060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:05.340000 audit[1794]: USER_ACCT pid=1794 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:05.341778 sshd[1794]: Accepted publickey for core from 10.200.16.10 port 54060 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:50:05.341000 audit[1794]: CRED_ACQ pid=1794 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:05.341000 audit[1794]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcd578760 a2=3 a3=1 items=0 ppid=1 pid=1794 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:05.341000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:50:05.343294 sshd[1794]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:50:05.347584 systemd[1]: Started session-9.scope. May 17 00:50:05.348036 systemd-logind[1462]: New session 9 of user core. May 17 00:50:05.350000 audit[1794]: USER_START pid=1794 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:05.352000 audit[1796]: CRED_ACQ pid=1796 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:05.611000 audit[1797]: USER_ACCT pid=1797 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:50:05.611000 audit[1797]: CRED_REFR pid=1797 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:50:05.612298 sudo[1797]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 17 00:50:05.612508 sudo[1797]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:50:05.613000 audit[1797]: USER_START pid=1797 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:50:05.624858 systemd[1]: Starting coreos-metadata.service... May 17 00:50:05.670001 kernel: hv_balloon: Max. dynamic memory size: 4096 MB May 17 00:50:05.694445 coreos-metadata[1801]: May 17 00:50:05.694 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 May 17 00:50:05.697697 coreos-metadata[1801]: May 17 00:50:05.697 INFO Fetch successful May 17 00:50:05.697899 coreos-metadata[1801]: May 17 00:50:05.697 INFO Fetching http://168.63.129.16/machine/?comp=goalstate: Attempt #1 May 17 00:50:05.699666 coreos-metadata[1801]: May 17 00:50:05.699 INFO Fetch successful May 17 00:50:05.700006 coreos-metadata[1801]: May 17 00:50:05.699 INFO Fetching http://168.63.129.16/machine/5d104cef-773a-4e0a-b18b-6ca4397ec79d/b9207bee%2D4084%2D4b5c%2Dafbc%2Dc882ebe4d04f.%5Fci%2D3510.3.7%2Dn%2Db41680b403?comp=config&type=sharedConfig&incarnation=1: Attempt #1 May 17 00:50:05.701854 coreos-metadata[1801]: May 17 00:50:05.701 INFO Fetch successful May 17 00:50:05.735467 coreos-metadata[1801]: May 17 00:50:05.735 INFO Fetching http://169.254.169.254/metadata/instance/compute/vmSize?api-version=2017-08-01&format=text: Attempt #1 May 17 00:50:05.745139 coreos-metadata[1801]: May 17 00:50:05.745 INFO Fetch successful May 17 00:50:05.753104 systemd[1]: Finished coreos-metadata.service. May 17 00:50:05.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:06.179000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:06.179000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:06.180004 systemd[1]: Stopped kubelet.service. May 17 00:50:06.181953 systemd[1]: Starting kubelet.service... May 17 00:50:06.205276 systemd[1]: Reloading. May 17 00:50:06.285739 /usr/lib/systemd/system-generators/torcx-generator[1857]: time="2025-05-17T00:50:06Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:50:06.286123 /usr/lib/systemd/system-generators/torcx-generator[1857]: time="2025-05-17T00:50:06Z" level=info msg="torcx already run" May 17 00:50:06.358175 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:50:06.358344 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:50:06.374653 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:50:06.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.448000 audit: BPF prog-id=47 op=LOAD May 17 00:50:06.449000 audit: BPF prog-id=39 op=UNLOAD May 17 00:50:06.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.449000 audit: BPF prog-id=48 op=LOAD May 17 00:50:06.449000 audit: BPF prog-id=40 op=UNLOAD May 17 00:50:06.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.451000 audit: BPF prog-id=49 op=LOAD May 17 00:50:06.452000 audit: BPF prog-id=41 op=UNLOAD May 17 00:50:06.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.452000 audit: BPF prog-id=50 op=LOAD May 17 00:50:06.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.452000 audit: BPF prog-id=51 op=LOAD May 17 00:50:06.453000 audit: BPF prog-id=42 op=UNLOAD May 17 00:50:06.453000 audit: BPF prog-id=43 op=UNLOAD May 17 00:50:06.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.454000 audit: BPF prog-id=52 op=LOAD May 17 00:50:06.454000 audit: BPF prog-id=30 op=UNLOAD May 17 00:50:06.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.455000 audit: BPF prog-id=53 op=LOAD May 17 00:50:06.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.455000 audit: BPF prog-id=54 op=LOAD May 17 00:50:06.455000 audit: BPF prog-id=31 op=UNLOAD May 17 00:50:06.455000 audit: BPF prog-id=32 op=UNLOAD May 17 00:50:06.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.456000 audit: BPF prog-id=55 op=LOAD May 17 00:50:06.456000 audit: BPF prog-id=44 op=UNLOAD May 17 00:50:06.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.457000 audit: BPF prog-id=56 op=LOAD May 17 00:50:06.457000 audit: BPF prog-id=33 op=UNLOAD May 17 00:50:06.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.457000 audit: BPF prog-id=57 op=LOAD May 17 00:50:06.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.458000 audit: BPF prog-id=58 op=LOAD May 17 00:50:06.458000 audit: BPF prog-id=34 op=UNLOAD May 17 00:50:06.458000 audit: BPF prog-id=35 op=UNLOAD May 17 00:50:06.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.461000 audit: BPF prog-id=59 op=LOAD May 17 00:50:06.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.461000 audit: BPF prog-id=60 op=LOAD May 17 00:50:06.462000 audit: BPF prog-id=36 op=UNLOAD May 17 00:50:06.462000 audit: BPF prog-id=37 op=UNLOAD May 17 00:50:06.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:06.463000 audit: BPF prog-id=61 op=LOAD May 17 00:50:06.463000 audit: BPF prog-id=46 op=UNLOAD May 17 00:50:06.484812 systemd[1]: Started kubelet.service. May 17 00:50:06.483000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:06.486417 systemd[1]: Stopping kubelet.service... May 17 00:50:06.486707 systemd[1]: kubelet.service: Deactivated successfully. May 17 00:50:06.486866 systemd[1]: Stopped kubelet.service. May 17 00:50:06.485000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:06.488218 systemd[1]: Starting kubelet.service... May 17 00:50:06.676000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:06.677193 systemd[1]: Started kubelet.service. May 17 00:50:06.817643 kubelet[1921]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:50:06.818442 kubelet[1921]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 17 00:50:06.818557 kubelet[1921]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:50:06.818848 kubelet[1921]: I0517 00:50:06.818790 1921 server.go:211] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 17 00:50:07.725094 kubelet[1921]: I0517 00:50:07.725051 1921 server.go:491] "Kubelet version" kubeletVersion="v1.31.8" May 17 00:50:07.725094 kubelet[1921]: I0517 00:50:07.725085 1921 server.go:493] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 17 00:50:07.725340 kubelet[1921]: I0517 00:50:07.725318 1921 server.go:934] "Client rotation is on, will bootstrap in background" May 17 00:50:07.748936 kubelet[1921]: I0517 00:50:07.748901 1921 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 17 00:50:07.764597 kubelet[1921]: E0517 00:50:07.764544 1921 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 17 00:50:07.764597 kubelet[1921]: I0517 00:50:07.764594 1921 server.go:1408] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 17 00:50:07.768231 kubelet[1921]: I0517 00:50:07.768203 1921 server.go:749] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 17 00:50:07.768921 kubelet[1921]: I0517 00:50:07.768902 1921 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" May 17 00:50:07.769067 kubelet[1921]: I0517 00:50:07.769043 1921 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 17 00:50:07.769265 kubelet[1921]: I0517 00:50:07.769068 1921 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.200.20.28","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 17 00:50:07.769356 kubelet[1921]: I0517 00:50:07.769270 1921 topology_manager.go:138] "Creating topology manager with none policy" May 17 00:50:07.769356 kubelet[1921]: I0517 00:50:07.769280 1921 container_manager_linux.go:300] "Creating device plugin manager" May 17 00:50:07.769403 kubelet[1921]: I0517 00:50:07.769381 1921 state_mem.go:36] "Initialized new in-memory state store" May 17 00:50:07.771603 kubelet[1921]: I0517 00:50:07.771584 1921 kubelet.go:408] "Attempting to sync node with API server" May 17 00:50:07.771642 kubelet[1921]: I0517 00:50:07.771610 1921 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" May 17 00:50:07.771642 kubelet[1921]: I0517 00:50:07.771629 1921 kubelet.go:314] "Adding apiserver pod source" May 17 00:50:07.771696 kubelet[1921]: I0517 00:50:07.771642 1921 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 17 00:50:07.776596 kubelet[1921]: I0517 00:50:07.776574 1921 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 17 00:50:07.777067 kubelet[1921]: I0517 00:50:07.777050 1921 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 17 00:50:07.777099 kubelet[1921]: W0517 00:50:07.777095 1921 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 17 00:50:07.777611 kubelet[1921]: I0517 00:50:07.777589 1921 server.go:1274] "Started kubelet" May 17 00:50:07.789732 kubelet[1921]: E0517 00:50:07.789705 1921 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:50:07.789883 kubelet[1921]: E0517 00:50:07.789868 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:50:07.790000 audit[1921]: AVC avc: denied { mac_admin } for pid=1921 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:07.790000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:50:07.790000 audit[1921]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400096fcb0 a1=400047dcc8 a2=400096fc80 a3=25 items=0 ppid=1 pid=1921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:07.790000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:50:07.790000 audit[1921]: AVC avc: denied { mac_admin } for pid=1921 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:07.790000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:50:07.790000 audit[1921]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40006c9fc0 a1=400047dce0 a2=400096fd40 a3=25 items=0 ppid=1 pid=1921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:07.790000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:50:07.791874 kubelet[1921]: I0517 00:50:07.791487 1921 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 17 00:50:07.791874 kubelet[1921]: I0517 00:50:07.791532 1921 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 17 00:50:07.791874 kubelet[1921]: I0517 00:50:07.791591 1921 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 17 00:50:07.794366 kubelet[1921]: I0517 00:50:07.794333 1921 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 17 00:50:07.793000 audit[1933]: NETFILTER_CFG table=mangle:5 family=2 entries=2 op=nft_register_chain pid=1933 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:50:07.793000 audit[1933]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffd5306130 a2=0 a3=1 items=0 ppid=1921 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:07.793000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 00:50:07.794000 audit[1934]: NETFILTER_CFG table=filter:6 family=2 entries=2 op=nft_register_chain pid=1934 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:50:07.794000 audit[1934]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffe7e00390 a2=0 a3=1 items=0 ppid=1921 pid=1934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:07.794000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 00:50:07.795746 kubelet[1921]: I0517 00:50:07.795731 1921 server.go:449] "Adding debug handlers to kubelet server" May 17 00:50:07.796400 kubelet[1921]: I0517 00:50:07.796367 1921 volume_manager.go:289] "Starting Kubelet Volume Manager" May 17 00:50:07.796600 kubelet[1921]: E0517 00:50:07.796570 1921 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.200.20.28\" not found" May 17 00:50:07.796923 kubelet[1921]: I0517 00:50:07.796881 1921 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 17 00:50:07.797226 kubelet[1921]: I0517 00:50:07.797208 1921 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 17 00:50:07.797481 kubelet[1921]: I0517 00:50:07.797463 1921 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 17 00:50:07.796000 audit[1936]: NETFILTER_CFG table=filter:7 family=2 entries=2 op=nft_register_chain pid=1936 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:50:07.796000 audit[1936]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffcb054a50 a2=0 a3=1 items=0 ppid=1921 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:07.796000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:50:07.798525 kubelet[1921]: I0517 00:50:07.798500 1921 desired_state_of_world_populator.go:147] "Desired state populator starts to run" May 17 00:50:07.798580 kubelet[1921]: I0517 00:50:07.798560 1921 reconciler.go:26] "Reconciler: start to sync state" May 17 00:50:07.798000 audit[1938]: NETFILTER_CFG table=filter:8 family=2 entries=2 op=nft_register_chain pid=1938 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:50:07.798000 audit[1938]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffeefd5830 a2=0 a3=1 items=0 ppid=1921 pid=1938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:07.798000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:50:07.801570 kubelet[1921]: I0517 00:50:07.801550 1921 factory.go:221] Registration of the systemd container factory successfully May 17 00:50:07.801726 kubelet[1921]: I0517 00:50:07.801710 1921 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 17 00:50:07.804263 kubelet[1921]: E0517 00:50:07.804237 1921 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.200.20.28\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" May 17 00:50:07.805204 kubelet[1921]: E0517 00:50:07.805182 1921 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 17 00:50:07.805391 kubelet[1921]: W0517 00:50:07.805368 1921 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope May 17 00:50:07.805493 kubelet[1921]: E0517 00:50:07.805478 1921 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" May 17 00:50:07.806733 kubelet[1921]: E0517 00:50:07.805675 1921 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.200.20.28.18402a283fd27b7e default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.200.20.28,UID:10.200.20.28,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:10.200.20.28,},FirstTimestamp:2025-05-17 00:50:07.777569662 +0000 UTC m=+1.094445494,LastTimestamp:2025-05-17 00:50:07.777569662 +0000 UTC m=+1.094445494,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.200.20.28,}" May 17 00:50:07.806990 kubelet[1921]: W0517 00:50:07.806961 1921 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "10.200.20.28" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope May 17 00:50:07.807086 kubelet[1921]: E0517 00:50:07.807072 1921 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes \"10.200.20.28\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" May 17 00:50:07.807346 kubelet[1921]: I0517 00:50:07.807331 1921 factory.go:221] Registration of the containerd container factory successfully May 17 00:50:07.816173 kubelet[1921]: E0517 00:50:07.816099 1921 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.200.20.28.18402a284177a778 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.200.20.28,UID:10.200.20.28,APIVersion:,ResourceVersion:,FieldPath:,},Reason:InvalidDiskCapacity,Message:invalid capacity 0 on image filesystem,Source:EventSource{Component:kubelet,Host:10.200.20.28,},FirstTimestamp:2025-05-17 00:50:07.805171576 +0000 UTC m=+1.122047448,LastTimestamp:2025-05-17 00:50:07.805171576 +0000 UTC m=+1.122047448,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.200.20.28,}" May 17 00:50:07.820828 kubelet[1921]: I0517 00:50:07.820798 1921 cpu_manager.go:214] "Starting CPU manager" policy="none" May 17 00:50:07.821155 kubelet[1921]: I0517 00:50:07.821143 1921 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 17 00:50:07.821246 kubelet[1921]: I0517 00:50:07.821237 1921 state_mem.go:36] "Initialized new in-memory state store" May 17 00:50:07.827236 kubelet[1921]: I0517 00:50:07.827216 1921 policy_none.go:49] "None policy: Start" May 17 00:50:07.827853 kubelet[1921]: I0517 00:50:07.827842 1921 memory_manager.go:170] "Starting memorymanager" policy="None" May 17 00:50:07.827936 kubelet[1921]: I0517 00:50:07.827927 1921 state_mem.go:35] "Initializing new in-memory state store" May 17 00:50:07.838098 systemd[1]: Created slice kubepods.slice. May 17 00:50:07.843662 systemd[1]: Created slice kubepods-burstable.slice. May 17 00:50:07.846343 systemd[1]: Created slice kubepods-besteffort.slice. May 17 00:50:07.852000 audit[1921]: AVC avc: denied { mac_admin } for pid=1921 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:07.852000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:50:07.852000 audit[1921]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400085e1e0 a1=400047d638 a2=400085e1b0 a3=25 items=0 ppid=1 pid=1921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:07.852000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:50:07.854215 kubelet[1921]: I0517 00:50:07.853916 1921 manager.go:513] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 17 00:50:07.854215 kubelet[1921]: I0517 00:50:07.854092 1921 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 17 00:50:07.854273 kubelet[1921]: I0517 00:50:07.854253 1921 eviction_manager.go:189] "Eviction manager: starting control loop" May 17 00:50:07.854299 kubelet[1921]: I0517 00:50:07.854266 1921 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 17 00:50:07.855073 kubelet[1921]: I0517 00:50:07.854611 1921 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 17 00:50:07.856633 kubelet[1921]: E0517 00:50:07.856577 1921 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.200.20.28\" not found" May 17 00:50:07.864000 audit[1945]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1945 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:50:07.864000 audit[1945]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffd6246240 a2=0 a3=1 items=0 ppid=1921 pid=1945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:07.864000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 17 00:50:07.865966 kubelet[1921]: I0517 00:50:07.865932 1921 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 17 00:50:07.866000 audit[1947]: NETFILTER_CFG table=mangle:10 family=10 entries=2 op=nft_register_chain pid=1947 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:50:07.866000 audit[1947]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffffd199510 a2=0 a3=1 items=0 ppid=1921 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:07.866000 audit[1948]: NETFILTER_CFG table=mangle:11 family=2 entries=1 op=nft_register_chain pid=1948 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:50:07.866000 audit[1948]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff24875c0 a2=0 a3=1 items=0 ppid=1921 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:07.866000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 00:50:07.866000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 00:50:07.867881 kubelet[1921]: I0517 00:50:07.867852 1921 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 17 00:50:07.867881 kubelet[1921]: I0517 00:50:07.867880 1921 status_manager.go:217] "Starting to sync pod status with apiserver" May 17 00:50:07.867956 kubelet[1921]: I0517 00:50:07.867898 1921 kubelet.go:2321] "Starting kubelet main sync loop" May 17 00:50:07.868036 kubelet[1921]: E0517 00:50:07.868015 1921 kubelet.go:2345] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" May 17 00:50:07.867000 audit[1949]: NETFILTER_CFG table=nat:12 family=2 entries=2 op=nft_register_chain pid=1949 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:50:07.867000 audit[1949]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffe9425890 a2=0 a3=1 items=0 ppid=1921 pid=1949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:07.867000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 00:50:07.868000 audit[1950]: NETFILTER_CFG table=mangle:13 family=10 entries=1 op=nft_register_chain pid=1950 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:50:07.868000 audit[1950]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffff121390 a2=0 a3=1 items=0 ppid=1921 pid=1950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:07.868000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 00:50:07.869000 audit[1951]: NETFILTER_CFG table=filter:14 family=2 entries=1 op=nft_register_chain pid=1951 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:50:07.869000 audit[1951]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd137a580 a2=0 a3=1 items=0 ppid=1921 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:07.869000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 00:50:07.870000 audit[1952]: NETFILTER_CFG table=nat:15 family=10 entries=2 op=nft_register_chain pid=1952 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:50:07.870000 audit[1952]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffef9e0230 a2=0 a3=1 items=0 ppid=1921 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:07.870000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 00:50:07.871000 audit[1953]: NETFILTER_CFG table=filter:16 family=10 entries=2 op=nft_register_chain pid=1953 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:50:07.871000 audit[1953]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc7b0cf50 a2=0 a3=1 items=0 ppid=1921 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:07.871000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 00:50:07.955893 kubelet[1921]: I0517 00:50:07.955861 1921 kubelet_node_status.go:72] "Attempting to register node" node="10.200.20.28" May 17 00:50:07.963260 kubelet[1921]: I0517 00:50:07.963234 1921 kubelet_node_status.go:75] "Successfully registered node" node="10.200.20.28" May 17 00:50:07.963260 kubelet[1921]: E0517 00:50:07.963264 1921 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"10.200.20.28\": node \"10.200.20.28\" not found" May 17 00:50:07.978015 kubelet[1921]: E0517 00:50:07.976822 1921 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.200.20.28\" not found" May 17 00:50:08.077671 kubelet[1921]: E0517 00:50:08.077641 1921 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.200.20.28\" not found" May 17 00:50:08.178162 kubelet[1921]: E0517 00:50:08.178135 1921 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.200.20.28\" not found" May 17 00:50:08.209052 sudo[1797]: pam_unix(sudo:session): session closed for user root May 17 00:50:08.208000 audit[1797]: USER_END pid=1797 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:50:08.208000 audit[1797]: CRED_DISP pid=1797 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:50:08.278763 kubelet[1921]: E0517 00:50:08.278667 1921 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.200.20.28\" not found" May 17 00:50:08.301102 sshd[1794]: pam_unix(sshd:session): session closed for user core May 17 00:50:08.301000 audit[1794]: USER_END pid=1794 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:08.301000 audit[1794]: CRED_DISP pid=1794 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:50:08.303911 systemd-logind[1462]: Session 9 logged out. Waiting for processes to exit. May 17 00:50:08.304469 systemd[1]: sshd@6-10.200.20.28:22-10.200.16.10:54060.service: Deactivated successfully. May 17 00:50:08.303000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.28:22-10.200.16.10:54060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:08.305140 systemd[1]: session-9.scope: Deactivated successfully. May 17 00:50:08.305798 systemd-logind[1462]: Removed session 9. May 17 00:50:08.379133 kubelet[1921]: E0517 00:50:08.379095 1921 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.200.20.28\" not found" May 17 00:50:08.479521 kubelet[1921]: E0517 00:50:08.479498 1921 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.200.20.28\" not found" May 17 00:50:08.580326 kubelet[1921]: E0517 00:50:08.579995 1921 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.200.20.28\" not found" May 17 00:50:08.680777 kubelet[1921]: E0517 00:50:08.680750 1921 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.200.20.28\" not found" May 17 00:50:08.727188 kubelet[1921]: I0517 00:50:08.727170 1921 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" May 17 00:50:08.727458 kubelet[1921]: W0517 00:50:08.727438 1921 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.CSIDriver ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 17 00:50:08.727620 kubelet[1921]: W0517 00:50:08.727606 1921 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 17 00:50:08.781755 kubelet[1921]: I0517 00:50:08.781721 1921 kuberuntime_manager.go:1635] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" May 17 00:50:08.782164 env[1476]: time="2025-05-17T00:50:08.782086067Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 17 00:50:08.782645 kubelet[1921]: I0517 00:50:08.782561 1921 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" May 17 00:50:08.790273 kubelet[1921]: I0517 00:50:08.790250 1921 apiserver.go:52] "Watching apiserver" May 17 00:50:08.790344 kubelet[1921]: E0517 00:50:08.790256 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:50:08.792476 kubelet[1921]: E0517 00:50:08.792436 1921 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wfbrr" podUID="8a14b7c5-5085-44c4-a97d-df8fa59ba1ab" May 17 00:50:08.797021 systemd[1]: Created slice kubepods-besteffort-pod85829396_91e6_4063_824d_254053907c0b.slice. May 17 00:50:08.800085 kubelet[1921]: I0517 00:50:08.800039 1921 desired_state_of_world_populator.go:155] "Finished populating initial desired state of world" May 17 00:50:08.804598 kubelet[1921]: I0517 00:50:08.804573 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/85829396-91e6-4063-824d-254053907c0b-tigera-ca-bundle\") pod \"calico-node-qktgp\" (UID: \"85829396-91e6-4063-824d-254053907c0b\") " pod="calico-system/calico-node-qktgp" May 17 00:50:08.804721 kubelet[1921]: I0517 00:50:08.804696 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/62846e04-7adb-4542-94a3-9ccfd3a13c42-kube-proxy\") pod \"kube-proxy-x8p52\" (UID: \"62846e04-7adb-4542-94a3-9ccfd3a13c42\") " pod="kube-system/kube-proxy-x8p52" May 17 00:50:08.804893 kubelet[1921]: I0517 00:50:08.804874 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/8a14b7c5-5085-44c4-a97d-df8fa59ba1ab-varrun\") pod \"csi-node-driver-wfbrr\" (UID: \"8a14b7c5-5085-44c4-a97d-df8fa59ba1ab\") " pod="calico-system/csi-node-driver-wfbrr" May 17 00:50:08.805011 kubelet[1921]: I0517 00:50:08.804995 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8wfs6\" (UniqueName: \"kubernetes.io/projected/8a14b7c5-5085-44c4-a97d-df8fa59ba1ab-kube-api-access-8wfs6\") pod \"csi-node-driver-wfbrr\" (UID: \"8a14b7c5-5085-44c4-a97d-df8fa59ba1ab\") " pod="calico-system/csi-node-driver-wfbrr" May 17 00:50:08.805094 kubelet[1921]: I0517 00:50:08.805082 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/85829396-91e6-4063-824d-254053907c0b-cni-net-dir\") pod \"calico-node-qktgp\" (UID: \"85829396-91e6-4063-824d-254053907c0b\") " pod="calico-system/calico-node-qktgp" May 17 00:50:08.805170 kubelet[1921]: I0517 00:50:08.805158 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/85829396-91e6-4063-824d-254053907c0b-lib-modules\") pod \"calico-node-qktgp\" (UID: \"85829396-91e6-4063-824d-254053907c0b\") " pod="calico-system/calico-node-qktgp" May 17 00:50:08.805236 kubelet[1921]: I0517 00:50:08.805223 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/85829396-91e6-4063-824d-254053907c0b-policysync\") pod \"calico-node-qktgp\" (UID: \"85829396-91e6-4063-824d-254053907c0b\") " pod="calico-system/calico-node-qktgp" May 17 00:50:08.805334 kubelet[1921]: I0517 00:50:08.805287 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/8a14b7c5-5085-44c4-a97d-df8fa59ba1ab-socket-dir\") pod \"csi-node-driver-wfbrr\" (UID: \"8a14b7c5-5085-44c4-a97d-df8fa59ba1ab\") " pod="calico-system/csi-node-driver-wfbrr" May 17 00:50:08.805409 kubelet[1921]: I0517 00:50:08.805396 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/85829396-91e6-4063-824d-254053907c0b-cni-log-dir\") pod \"calico-node-qktgp\" (UID: \"85829396-91e6-4063-824d-254053907c0b\") " pod="calico-system/calico-node-qktgp" May 17 00:50:08.805472 kubelet[1921]: I0517 00:50:08.805461 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/62846e04-7adb-4542-94a3-9ccfd3a13c42-lib-modules\") pod \"kube-proxy-x8p52\" (UID: \"62846e04-7adb-4542-94a3-9ccfd3a13c42\") " pod="kube-system/kube-proxy-x8p52" May 17 00:50:08.805646 kubelet[1921]: I0517 00:50:08.805631 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-55kz4\" (UniqueName: \"kubernetes.io/projected/62846e04-7adb-4542-94a3-9ccfd3a13c42-kube-api-access-55kz4\") pod \"kube-proxy-x8p52\" (UID: \"62846e04-7adb-4542-94a3-9ccfd3a13c42\") " pod="kube-system/kube-proxy-x8p52" May 17 00:50:08.805843 kubelet[1921]: I0517 00:50:08.805827 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/8a14b7c5-5085-44c4-a97d-df8fa59ba1ab-kubelet-dir\") pod \"csi-node-driver-wfbrr\" (UID: \"8a14b7c5-5085-44c4-a97d-df8fa59ba1ab\") " pod="calico-system/csi-node-driver-wfbrr" May 17 00:50:08.805934 kubelet[1921]: I0517 00:50:08.805911 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/85829396-91e6-4063-824d-254053907c0b-node-certs\") pod \"calico-node-qktgp\" (UID: \"85829396-91e6-4063-824d-254053907c0b\") " pod="calico-system/calico-node-qktgp" May 17 00:50:08.806029 kubelet[1921]: I0517 00:50:08.806016 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xdgnt\" (UniqueName: \"kubernetes.io/projected/85829396-91e6-4063-824d-254053907c0b-kube-api-access-xdgnt\") pod \"calico-node-qktgp\" (UID: \"85829396-91e6-4063-824d-254053907c0b\") " pod="calico-system/calico-node-qktgp" May 17 00:50:08.806099 kubelet[1921]: I0517 00:50:08.806085 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/62846e04-7adb-4542-94a3-9ccfd3a13c42-xtables-lock\") pod \"kube-proxy-x8p52\" (UID: \"62846e04-7adb-4542-94a3-9ccfd3a13c42\") " pod="kube-system/kube-proxy-x8p52" May 17 00:50:08.806181 kubelet[1921]: I0517 00:50:08.806168 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/85829396-91e6-4063-824d-254053907c0b-var-run-calico\") pod \"calico-node-qktgp\" (UID: \"85829396-91e6-4063-824d-254053907c0b\") " pod="calico-system/calico-node-qktgp" May 17 00:50:08.806253 kubelet[1921]: I0517 00:50:08.806242 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/85829396-91e6-4063-824d-254053907c0b-xtables-lock\") pod \"calico-node-qktgp\" (UID: \"85829396-91e6-4063-824d-254053907c0b\") " pod="calico-system/calico-node-qktgp" May 17 00:50:08.806319 kubelet[1921]: I0517 00:50:08.806307 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/8a14b7c5-5085-44c4-a97d-df8fa59ba1ab-registration-dir\") pod \"csi-node-driver-wfbrr\" (UID: \"8a14b7c5-5085-44c4-a97d-df8fa59ba1ab\") " pod="calico-system/csi-node-driver-wfbrr" May 17 00:50:08.806751 kubelet[1921]: I0517 00:50:08.806734 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/85829396-91e6-4063-824d-254053907c0b-cni-bin-dir\") pod \"calico-node-qktgp\" (UID: \"85829396-91e6-4063-824d-254053907c0b\") " pod="calico-system/calico-node-qktgp" May 17 00:50:08.806869 kubelet[1921]: I0517 00:50:08.806843 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/85829396-91e6-4063-824d-254053907c0b-flexvol-driver-host\") pod \"calico-node-qktgp\" (UID: \"85829396-91e6-4063-824d-254053907c0b\") " pod="calico-system/calico-node-qktgp" May 17 00:50:08.807025 kubelet[1921]: I0517 00:50:08.807002 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/85829396-91e6-4063-824d-254053907c0b-var-lib-calico\") pod \"calico-node-qktgp\" (UID: \"85829396-91e6-4063-824d-254053907c0b\") " pod="calico-system/calico-node-qktgp" May 17 00:50:08.807149 systemd[1]: Created slice kubepods-besteffort-pod62846e04_7adb_4542_94a3_9ccfd3a13c42.slice. May 17 00:50:08.909029 kubelet[1921]: I0517 00:50:08.908998 1921 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 17 00:50:08.909742 kubelet[1921]: E0517 00:50:08.909713 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:08.909800 kubelet[1921]: W0517 00:50:08.909743 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:08.909800 kubelet[1921]: E0517 00:50:08.909762 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:08.909946 kubelet[1921]: E0517 00:50:08.909920 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:08.909946 kubelet[1921]: W0517 00:50:08.909934 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:08.909946 kubelet[1921]: E0517 00:50:08.909943 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:08.910236 kubelet[1921]: E0517 00:50:08.910085 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:08.910236 kubelet[1921]: W0517 00:50:08.910093 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:08.910354 kubelet[1921]: E0517 00:50:08.910324 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:08.910557 kubelet[1921]: E0517 00:50:08.910535 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:08.910557 kubelet[1921]: W0517 00:50:08.910551 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:08.910628 kubelet[1921]: E0517 00:50:08.910563 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:08.917864 kubelet[1921]: E0517 00:50:08.917838 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:08.917864 kubelet[1921]: W0517 00:50:08.917856 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:08.917864 kubelet[1921]: E0517 00:50:08.917867 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:08.978668 kubelet[1921]: E0517 00:50:08.978648 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:08.978784 kubelet[1921]: W0517 00:50:08.978771 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:08.978854 kubelet[1921]: E0517 00:50:08.978832 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:08.980474 kubelet[1921]: E0517 00:50:08.980457 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:08.980564 kubelet[1921]: W0517 00:50:08.980552 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:08.980646 kubelet[1921]: E0517 00:50:08.980634 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:08.985846 kubelet[1921]: E0517 00:50:08.985831 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:08.985952 kubelet[1921]: W0517 00:50:08.985939 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:08.986038 kubelet[1921]: E0517 00:50:08.986026 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:09.106222 env[1476]: time="2025-05-17T00:50:09.106181567Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-qktgp,Uid:85829396-91e6-4063-824d-254053907c0b,Namespace:calico-system,Attempt:0,}" May 17 00:50:09.110780 env[1476]: time="2025-05-17T00:50:09.110746526Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-x8p52,Uid:62846e04-7adb-4542-94a3-9ccfd3a13c42,Namespace:kube-system,Attempt:0,}" May 17 00:50:09.791034 kubelet[1921]: E0517 00:50:09.790997 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:50:10.059645 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2401699591.mount: Deactivated successfully. May 17 00:50:10.099796 env[1476]: time="2025-05-17T00:50:10.099718870Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:50:10.105213 env[1476]: time="2025-05-17T00:50:10.105179589Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:50:10.128131 env[1476]: time="2025-05-17T00:50:10.128104665Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:50:10.138361 env[1476]: time="2025-05-17T00:50:10.138333223Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:50:10.146274 env[1476]: time="2025-05-17T00:50:10.146246702Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:50:10.151177 env[1476]: time="2025-05-17T00:50:10.151132061Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:50:10.158413 env[1476]: time="2025-05-17T00:50:10.158384420Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:50:10.163577 env[1476]: time="2025-05-17T00:50:10.163529499Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:50:10.241704 env[1476]: time="2025-05-17T00:50:10.234717127Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:50:10.241704 env[1476]: time="2025-05-17T00:50:10.234749567Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:50:10.241704 env[1476]: time="2025-05-17T00:50:10.234758967Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:50:10.241704 env[1476]: time="2025-05-17T00:50:10.234854127Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0ad0b8fcd96be86b16f93b2a97a224feec138a7a43ca82994e8791e5aa859d4d pid=1976 runtime=io.containerd.runc.v2 May 17 00:50:10.242551 env[1476]: time="2025-05-17T00:50:10.241218886Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:50:10.242551 env[1476]: time="2025-05-17T00:50:10.241251126Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:50:10.242551 env[1476]: time="2025-05-17T00:50:10.241260646Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:50:10.242551 env[1476]: time="2025-05-17T00:50:10.241442086Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/61720d5d57f1fc9dc9a4998ad25e87ad59d5cda1fd6616ecada1d4a8cdca7538 pid=1995 runtime=io.containerd.runc.v2 May 17 00:50:10.259178 systemd[1]: Started cri-containerd-0ad0b8fcd96be86b16f93b2a97a224feec138a7a43ca82994e8791e5aa859d4d.scope. May 17 00:50:10.269953 systemd[1]: Started cri-containerd-61720d5d57f1fc9dc9a4998ad25e87ad59d5cda1fd6616ecada1d4a8cdca7538.scope. May 17 00:50:10.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:10.282346 kernel: kauditd_printk_skb: 242 callbacks suppressed May 17 00:50:10.282446 kernel: audit: type=1400 audit(1747443010.275:438): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:10.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:10.320486 kernel: audit: type=1400 audit(1747443010.275:439): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:10.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:10.328028 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 17 00:50:10.328127 kernel: audit: type=1400 audit(1747443010.275:440): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:10.349636 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 May 17 00:50:10.349753 kernel: audit: type=1400 audit(1747443010.275:441): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:10.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:10.370945 kernel: audit: backlog limit exceeded May 17 00:50:10.371080 kernel: audit: type=1400 audit(1747443010.275:442): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:10.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:10.393101 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 17 00:50:10.393228 kernel: audit: type=1400 audit(1747443010.275:443): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:10.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:10.412421 env[1476]: time="2025-05-17T00:50:10.412369538Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-x8p52,Uid:62846e04-7adb-4542-94a3-9ccfd3a13c42,Namespace:kube-system,Attempt:0,} returns sandbox id \"0ad0b8fcd96be86b16f93b2a97a224feec138a7a43ca82994e8791e5aa859d4d\"" May 17 00:50:10.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:10.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:10.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:10.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:10.275000 audit: BPF prog-id=62 op=LOAD May 17 00:50:10.295000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:10.295000 audit[2006]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=1976 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:10.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061643062386663643936626538366231366639336232613937613232 May 17 00:50:10.295000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:10.295000 audit[2006]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=1976 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:10.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061643062386663643936626538366231366639336232613937613232 May 17 00:50:10.295000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:10.295000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:10.295000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:10.295000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:10.295000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:10.295000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:10.295000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:10.295000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:10.295000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:10.295000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:10.295000 audit: BPF prog-id=63 op=LOAD May 17 00:50:10.295000 audit[2006]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=1976 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:10.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061643062386663643936626538366231366639336232613937613232 May 17 00:50:10.300000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:10.300000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:10.300000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:10.300000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:10.300000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:10.300000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:10.300000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:10.300000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:10.300000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:10.300000 audit: BPF prog-id=64 op=LOAD May 17 00:50:10.300000 audit[2006]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=1976 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:10.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061643062386663643936626538366231366639336232613937613232 May 17 00:50:10.300000 audit: BPF prog-id=64 op=UNLOAD May 17 00:50:10.300000 audit: BPF prog-id=63 op=UNLOAD May 17 00:50:10.300000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:10.300000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:10.300000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:10.300000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:10.300000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:10.300000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:10.300000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:10.300000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:10.300000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:10.300000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:10.300000 audit: BPF prog-id=65 op=LOAD May 17 00:50:10.300000 audit[2006]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=1976 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:10.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061643062386663643936626538366231366639336232613937613232 May 17 00:50:10.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:10.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:10.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:10.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:10.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:10.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:10.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:10.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:10.392000 audit: BPF prog-id=66 op=LOAD May 17 00:50:10.416881 env[1476]: time="2025-05-17T00:50:10.416834937Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.9\"" May 17 00:50:10.428788 env[1476]: time="2025-05-17T00:50:10.428684215Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-qktgp,Uid:85829396-91e6-4063-824d-254053907c0b,Namespace:calico-system,Attempt:0,} returns sandbox id \"61720d5d57f1fc9dc9a4998ad25e87ad59d5cda1fd6616ecada1d4a8cdca7538\"" May 17 00:50:10.791941 kubelet[1921]: E0517 00:50:10.791890 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:50:10.868945 kubelet[1921]: E0517 00:50:10.868865 1921 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wfbrr" podUID="8a14b7c5-5085-44c4-a97d-df8fa59ba1ab" May 17 00:50:11.594702 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2244042956.mount: Deactivated successfully. May 17 00:50:11.792187 kubelet[1921]: E0517 00:50:11.792140 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:50:12.105375 update_engine[1465]: I0517 00:50:12.105006 1465 update_attempter.cc:509] Updating boot flags... May 17 00:50:12.128017 env[1476]: time="2025-05-17T00:50:12.126402223Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:50:12.137683 env[1476]: time="2025-05-17T00:50:12.137259701Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbfba5e6542fe387b24d9e73bf5a054a6b07b95af1392268fd82b6f449ef1c27,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:50:12.143110 env[1476]: time="2025-05-17T00:50:12.143045861Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:50:12.151500 env[1476]: time="2025-05-17T00:50:12.151460819Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:fdf026cf2434537e499e9c739d189ca8fc57101d929ac5ccd8e24f979a9738c1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:50:12.151732 env[1476]: time="2025-05-17T00:50:12.151695139Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.9\" returns image reference \"sha256:cbfba5e6542fe387b24d9e73bf5a054a6b07b95af1392268fd82b6f449ef1c27\"" May 17 00:50:12.153327 env[1476]: time="2025-05-17T00:50:12.153132539Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\"" May 17 00:50:12.154491 env[1476]: time="2025-05-17T00:50:12.154452339Z" level=info msg="CreateContainer within sandbox \"0ad0b8fcd96be86b16f93b2a97a224feec138a7a43ca82994e8791e5aa859d4d\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 17 00:50:12.193819 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1885087091.mount: Deactivated successfully. May 17 00:50:12.226260 env[1476]: time="2025-05-17T00:50:12.226108088Z" level=info msg="CreateContainer within sandbox \"0ad0b8fcd96be86b16f93b2a97a224feec138a7a43ca82994e8791e5aa859d4d\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"f6ccb688054e2700da4b0e6d423e605b0d5133061f9109781e0383cfb9a39e18\"" May 17 00:50:12.228291 env[1476]: time="2025-05-17T00:50:12.228171768Z" level=info msg="StartContainer for \"f6ccb688054e2700da4b0e6d423e605b0d5133061f9109781e0383cfb9a39e18\"" May 17 00:50:12.246196 systemd[1]: Started cri-containerd-f6ccb688054e2700da4b0e6d423e605b0d5133061f9109781e0383cfb9a39e18.scope. May 17 00:50:12.259000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:12.259000 audit[2094]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1976 pid=2094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.259000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636636362363838303534653237303064613462306536643432336536 May 17 00:50:12.259000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:12.259000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:12.259000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:12.259000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:12.259000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:12.259000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:12.259000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:12.259000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:12.259000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:12.259000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:12.259000 audit: BPF prog-id=70 op=LOAD May 17 00:50:12.259000 audit[2094]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1976 pid=2094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.259000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636636362363838303534653237303064613462306536643432336536 May 17 00:50:12.259000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:12.259000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:12.259000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:12.259000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:12.259000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:12.259000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:12.259000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:12.259000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:12.259000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:12.259000 audit: BPF prog-id=71 op=LOAD May 17 00:50:12.259000 audit[2094]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1976 pid=2094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.259000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636636362363838303534653237303064613462306536643432336536 May 17 00:50:12.259000 audit: BPF prog-id=71 op=UNLOAD May 17 00:50:12.259000 audit: BPF prog-id=70 op=UNLOAD May 17 00:50:12.259000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:12.259000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:12.259000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:12.259000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:12.259000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:12.259000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:12.259000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:12.259000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:12.259000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:12.259000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:12.259000 audit: BPF prog-id=72 op=LOAD May 17 00:50:12.259000 audit[2094]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1976 pid=2094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.259000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636636362363838303534653237303064613462306536643432336536 May 17 00:50:12.280519 env[1476]: time="2025-05-17T00:50:12.280459400Z" level=info msg="StartContainer for \"f6ccb688054e2700da4b0e6d423e605b0d5133061f9109781e0383cfb9a39e18\" returns successfully" May 17 00:50:12.402000 audit[2152]: NETFILTER_CFG table=mangle:17 family=10 entries=1 op=nft_register_chain pid=2152 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:50:12.402000 audit[2152]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff9e33440 a2=0 a3=1 items=0 ppid=2105 pid=2152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.402000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:50:12.405000 audit[2156]: NETFILTER_CFG table=nat:18 family=10 entries=1 op=nft_register_chain pid=2156 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:50:12.405000 audit[2156]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd0cf86e0 a2=0 a3=1 items=0 ppid=2105 pid=2156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.405000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:50:12.406000 audit[2153]: NETFILTER_CFG table=mangle:19 family=2 entries=1 op=nft_register_chain pid=2153 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:50:12.406000 audit[2153]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc9316e40 a2=0 a3=1 items=0 ppid=2105 pid=2153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.406000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:50:12.406000 audit[2157]: NETFILTER_CFG table=filter:20 family=10 entries=1 op=nft_register_chain pid=2157 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:50:12.406000 audit[2157]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe4058080 a2=0 a3=1 items=0 ppid=2105 pid=2157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.406000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 00:50:12.408000 audit[2158]: NETFILTER_CFG table=nat:21 family=2 entries=1 op=nft_register_chain pid=2158 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:50:12.408000 audit[2158]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe93a9060 a2=0 a3=1 items=0 ppid=2105 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.408000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:50:12.409000 audit[2159]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_chain pid=2159 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:50:12.409000 audit[2159]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff7604f30 a2=0 a3=1 items=0 ppid=2105 pid=2159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.409000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 00:50:12.506000 audit[2160]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2160 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:50:12.506000 audit[2160]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffdd9777b0 a2=0 a3=1 items=0 ppid=2105 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.506000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 00:50:12.509000 audit[2162]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2162 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:50:12.509000 audit[2162]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffe482a9b0 a2=0 a3=1 items=0 ppid=2105 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.509000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 17 00:50:12.512000 audit[2165]: NETFILTER_CFG table=filter:25 family=2 entries=2 op=nft_register_chain pid=2165 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:50:12.512000 audit[2165]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffcbb05380 a2=0 a3=1 items=0 ppid=2105 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.512000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 17 00:50:12.513000 audit[2166]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_chain pid=2166 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:50:12.513000 audit[2166]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe8cfd760 a2=0 a3=1 items=0 ppid=2105 pid=2166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.513000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 00:50:12.516000 audit[2168]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2168 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:50:12.516000 audit[2168]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd3943dc0 a2=0 a3=1 items=0 ppid=2105 pid=2168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.516000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 00:50:12.517000 audit[2169]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2169 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:50:12.517000 audit[2169]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd3d5bc60 a2=0 a3=1 items=0 ppid=2105 pid=2169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.517000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 00:50:12.519000 audit[2171]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2171 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:50:12.519000 audit[2171]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffdd5604e0 a2=0 a3=1 items=0 ppid=2105 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.519000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 00:50:12.522000 audit[2174]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2174 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:50:12.522000 audit[2174]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd2213140 a2=0 a3=1 items=0 ppid=2105 pid=2174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.522000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 17 00:50:12.523000 audit[2175]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_chain pid=2175 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:50:12.523000 audit[2175]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffefbd5220 a2=0 a3=1 items=0 ppid=2105 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.523000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 00:50:12.526000 audit[2177]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2177 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:50:12.526000 audit[2177]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffffcc7f190 a2=0 a3=1 items=0 ppid=2105 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.526000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 00:50:12.527000 audit[2178]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_chain pid=2178 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:50:12.527000 audit[2178]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc067a680 a2=0 a3=1 items=0 ppid=2105 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.527000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 00:50:12.529000 audit[2180]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_rule pid=2180 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:50:12.529000 audit[2180]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc0954ea0 a2=0 a3=1 items=0 ppid=2105 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.529000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:50:12.532000 audit[2183]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_rule pid=2183 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:50:12.532000 audit[2183]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffaf452d0 a2=0 a3=1 items=0 ppid=2105 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.532000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:50:12.535000 audit[2186]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_rule pid=2186 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:50:12.535000 audit[2186]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffccbca8b0 a2=0 a3=1 items=0 ppid=2105 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.535000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 00:50:12.536000 audit[2187]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2187 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:50:12.536000 audit[2187]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffe5093620 a2=0 a3=1 items=0 ppid=2105 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.536000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 00:50:12.538000 audit[2189]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2189 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:50:12.538000 audit[2189]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffdc9c9700 a2=0 a3=1 items=0 ppid=2105 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.538000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:50:12.603000 audit[2193]: NETFILTER_CFG table=nat:39 family=2 entries=2 op=nft_register_chain pid=2193 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:50:12.603000 audit[2193]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffc242fd80 a2=0 a3=1 items=0 ppid=2105 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.603000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:50:12.604000 audit[2194]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2194 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:50:12.604000 audit[2194]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe6a509e0 a2=0 a3=1 items=0 ppid=2105 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.604000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 00:50:12.606000 audit[2196]: NETFILTER_CFG table=nat:41 family=2 entries=2 op=nft_register_chain pid=2196 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:50:12.606000 audit[2196]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffea88f1a0 a2=0 a3=1 items=0 ppid=2105 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.606000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 00:50:12.700000 audit[2202]: NETFILTER_CFG table=filter:42 family=2 entries=7 op=nft_register_rule pid=2202 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:50:12.700000 audit[2202]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=fffff7aa6dd0 a2=0 a3=1 items=0 ppid=2105 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.700000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:50:12.793115 kubelet[1921]: E0517 00:50:12.793058 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:50:12.798000 audit[2202]: NETFILTER_CFG table=nat:43 family=2 entries=65 op=nft_register_chain pid=2202 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:50:12.798000 audit[2202]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=30940 a0=3 a1=fffff7aa6dd0 a2=0 a3=1 items=0 ppid=2105 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.798000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:50:12.823000 audit[2212]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2212 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:50:12.823000 audit[2212]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffc0c8b6a0 a2=0 a3=1 items=0 ppid=2105 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.823000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 00:50:12.825000 audit[2214]: NETFILTER_CFG table=filter:45 family=10 entries=2 op=nft_register_chain pid=2214 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:50:12.825000 audit[2214]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffd0c90bc0 a2=0 a3=1 items=0 ppid=2105 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.825000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 17 00:50:12.829000 audit[2217]: NETFILTER_CFG table=filter:46 family=10 entries=2 op=nft_register_chain pid=2217 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:50:12.829000 audit[2217]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffda528770 a2=0 a3=1 items=0 ppid=2105 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.829000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 17 00:50:12.830000 audit[2218]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_chain pid=2218 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:50:12.830000 audit[2218]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd53a5ac0 a2=0 a3=1 items=0 ppid=2105 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.830000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 00:50:12.832000 audit[2220]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_rule pid=2220 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:50:12.832000 audit[2220]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffdf508cf0 a2=0 a3=1 items=0 ppid=2105 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.832000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 00:50:12.833000 audit[2221]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2221 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:50:12.833000 audit[2221]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd839fdf0 a2=0 a3=1 items=0 ppid=2105 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.833000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 00:50:12.835000 audit[2223]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2223 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:50:12.835000 audit[2223]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffeef1ec20 a2=0 a3=1 items=0 ppid=2105 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.835000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 17 00:50:12.838000 audit[2226]: NETFILTER_CFG table=filter:51 family=10 entries=2 op=nft_register_chain pid=2226 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:50:12.838000 audit[2226]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=fffff217fac0 a2=0 a3=1 items=0 ppid=2105 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.838000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 00:50:12.839000 audit[2227]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_chain pid=2227 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:50:12.839000 audit[2227]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc80bccd0 a2=0 a3=1 items=0 ppid=2105 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.839000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 00:50:12.841000 audit[2229]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2229 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:50:12.841000 audit[2229]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffffde6cfe0 a2=0 a3=1 items=0 ppid=2105 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.841000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 00:50:12.842000 audit[2230]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_chain pid=2230 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:50:12.842000 audit[2230]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcbcb4510 a2=0 a3=1 items=0 ppid=2105 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.842000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 00:50:12.845000 audit[2232]: NETFILTER_CFG table=filter:55 family=10 entries=1 op=nft_register_rule pid=2232 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:50:12.845000 audit[2232]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe6a906e0 a2=0 a3=1 items=0 ppid=2105 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.845000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:50:12.851000 audit[2235]: NETFILTER_CFG table=filter:56 family=10 entries=1 op=nft_register_rule pid=2235 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:50:12.851000 audit[2235]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffd41e4e0 a2=0 a3=1 items=0 ppid=2105 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.851000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 00:50:12.855000 audit[2238]: NETFILTER_CFG table=filter:57 family=10 entries=1 op=nft_register_rule pid=2238 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:50:12.855000 audit[2238]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff4bd9130 a2=0 a3=1 items=0 ppid=2105 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.855000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 17 00:50:12.856000 audit[2239]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=2239 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:50:12.856000 audit[2239]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff069c500 a2=0 a3=1 items=0 ppid=2105 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.856000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 00:50:12.858000 audit[2241]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2241 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:50:12.858000 audit[2241]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffd1b2b430 a2=0 a3=1 items=0 ppid=2105 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.858000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:50:12.861000 audit[2244]: NETFILTER_CFG table=nat:60 family=10 entries=2 op=nft_register_chain pid=2244 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:50:12.861000 audit[2244]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffc4592cd0 a2=0 a3=1 items=0 ppid=2105 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.861000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:50:12.862000 audit[2245]: NETFILTER_CFG table=nat:61 family=10 entries=1 op=nft_register_chain pid=2245 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:50:12.862000 audit[2245]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc16fdc70 a2=0 a3=1 items=0 ppid=2105 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.862000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 00:50:12.864000 audit[2247]: NETFILTER_CFG table=nat:62 family=10 entries=2 op=nft_register_chain pid=2247 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:50:12.864000 audit[2247]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffdd433130 a2=0 a3=1 items=0 ppid=2105 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.864000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 00:50:12.865000 audit[2248]: NETFILTER_CFG table=filter:63 family=10 entries=1 op=nft_register_chain pid=2248 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:50:12.865000 audit[2248]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe23b7ed0 a2=0 a3=1 items=0 ppid=2105 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.865000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 00:50:12.867000 audit[2250]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_rule pid=2250 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:50:12.867000 audit[2250]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe46bb470 a2=0 a3=1 items=0 ppid=2105 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.867000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:50:12.869155 kubelet[1921]: E0517 00:50:12.868542 1921 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wfbrr" podUID="8a14b7c5-5085-44c4-a97d-df8fa59ba1ab" May 17 00:50:12.870000 audit[2253]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_rule pid=2253 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:50:12.870000 audit[2253]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe1fb3ed0 a2=0 a3=1 items=0 ppid=2105 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.870000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:50:12.874000 audit[2255]: NETFILTER_CFG table=filter:66 family=10 entries=3 op=nft_register_rule pid=2255 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 00:50:12.874000 audit[2255]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2088 a0=3 a1=fffff5675b10 a2=0 a3=1 items=0 ppid=2105 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.874000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:50:12.875000 audit[2255]: NETFILTER_CFG table=nat:67 family=10 entries=7 op=nft_register_chain pid=2255 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 00:50:12.875000 audit[2255]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=fffff5675b10 a2=0 a3=1 items=0 ppid=2105 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:12.875000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:50:12.936580 kubelet[1921]: E0517 00:50:12.936444 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:12.936580 kubelet[1921]: W0517 00:50:12.936468 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:12.936580 kubelet[1921]: E0517 00:50:12.936496 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:12.936971 kubelet[1921]: E0517 00:50:12.936840 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:12.936971 kubelet[1921]: W0517 00:50:12.936854 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:12.936971 kubelet[1921]: E0517 00:50:12.936878 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:12.937294 kubelet[1921]: E0517 00:50:12.937160 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:12.937294 kubelet[1921]: W0517 00:50:12.937173 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:12.937294 kubelet[1921]: E0517 00:50:12.937197 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:12.937598 kubelet[1921]: E0517 00:50:12.937466 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:12.937598 kubelet[1921]: W0517 00:50:12.937478 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:12.937598 kubelet[1921]: E0517 00:50:12.937488 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:12.937885 kubelet[1921]: E0517 00:50:12.937765 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:12.937885 kubelet[1921]: W0517 00:50:12.937777 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:12.937885 kubelet[1921]: E0517 00:50:12.937787 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:12.938178 kubelet[1921]: E0517 00:50:12.938068 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:12.938178 kubelet[1921]: W0517 00:50:12.938080 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:12.938178 kubelet[1921]: E0517 00:50:12.938090 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:12.938493 kubelet[1921]: E0517 00:50:12.938367 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:12.938493 kubelet[1921]: W0517 00:50:12.938379 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:12.938493 kubelet[1921]: E0517 00:50:12.938401 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:12.938792 kubelet[1921]: E0517 00:50:12.938662 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:12.938792 kubelet[1921]: W0517 00:50:12.938674 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:12.938792 kubelet[1921]: E0517 00:50:12.938686 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:12.939160 kubelet[1921]: E0517 00:50:12.939033 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:12.939160 kubelet[1921]: W0517 00:50:12.939055 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:12.939160 kubelet[1921]: E0517 00:50:12.939065 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:12.939465 kubelet[1921]: E0517 00:50:12.939340 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:12.939465 kubelet[1921]: W0517 00:50:12.939353 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:12.939465 kubelet[1921]: E0517 00:50:12.939376 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:12.939754 kubelet[1921]: E0517 00:50:12.939640 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:12.939754 kubelet[1921]: W0517 00:50:12.939652 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:12.939754 kubelet[1921]: E0517 00:50:12.939662 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:12.940066 kubelet[1921]: E0517 00:50:12.939934 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:12.940066 kubelet[1921]: W0517 00:50:12.939947 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:12.940066 kubelet[1921]: E0517 00:50:12.939956 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:12.940352 kubelet[1921]: E0517 00:50:12.940253 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:12.940352 kubelet[1921]: W0517 00:50:12.940265 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:12.940352 kubelet[1921]: E0517 00:50:12.940275 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:12.940635 kubelet[1921]: E0517 00:50:12.940521 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:12.940635 kubelet[1921]: W0517 00:50:12.940533 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:12.940635 kubelet[1921]: E0517 00:50:12.940545 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:12.940902 kubelet[1921]: E0517 00:50:12.940799 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:12.940902 kubelet[1921]: W0517 00:50:12.940811 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:12.940902 kubelet[1921]: E0517 00:50:12.940822 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:12.941175 kubelet[1921]: E0517 00:50:12.941070 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:12.941175 kubelet[1921]: W0517 00:50:12.941082 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:12.941175 kubelet[1921]: E0517 00:50:12.941092 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:12.941461 kubelet[1921]: E0517 00:50:12.941359 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:12.941461 kubelet[1921]: W0517 00:50:12.941371 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:12.941461 kubelet[1921]: E0517 00:50:12.941381 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:12.941723 kubelet[1921]: E0517 00:50:12.941622 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:12.941723 kubelet[1921]: W0517 00:50:12.941636 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:12.941723 kubelet[1921]: E0517 00:50:12.941646 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:12.941994 kubelet[1921]: E0517 00:50:12.941887 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:12.941994 kubelet[1921]: W0517 00:50:12.941898 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:12.941994 kubelet[1921]: E0517 00:50:12.941908 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:12.942170 kubelet[1921]: E0517 00:50:12.942153 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:12.942170 kubelet[1921]: W0517 00:50:12.942168 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:12.942230 kubelet[1921]: E0517 00:50:12.942178 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:13.039934 kubelet[1921]: E0517 00:50:13.037418 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:13.039934 kubelet[1921]: W0517 00:50:13.037439 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:13.039934 kubelet[1921]: E0517 00:50:13.037457 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:13.039934 kubelet[1921]: E0517 00:50:13.037613 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:13.039934 kubelet[1921]: W0517 00:50:13.037620 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:13.039934 kubelet[1921]: E0517 00:50:13.037629 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:13.039934 kubelet[1921]: E0517 00:50:13.038148 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:13.039934 kubelet[1921]: W0517 00:50:13.038159 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:13.039934 kubelet[1921]: E0517 00:50:13.038222 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:13.039934 kubelet[1921]: E0517 00:50:13.038656 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:13.040256 kubelet[1921]: W0517 00:50:13.038668 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:13.040256 kubelet[1921]: E0517 00:50:13.038710 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:13.040256 kubelet[1921]: E0517 00:50:13.039204 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:13.040256 kubelet[1921]: W0517 00:50:13.039216 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:13.040256 kubelet[1921]: E0517 00:50:13.039227 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:13.040256 kubelet[1921]: E0517 00:50:13.039756 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:13.040256 kubelet[1921]: W0517 00:50:13.039792 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:13.040256 kubelet[1921]: E0517 00:50:13.039804 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:13.040416 kubelet[1921]: E0517 00:50:13.040303 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:13.040416 kubelet[1921]: W0517 00:50:13.040312 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:13.040416 kubelet[1921]: E0517 00:50:13.040322 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:13.040480 kubelet[1921]: E0517 00:50:13.040459 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:13.040480 kubelet[1921]: W0517 00:50:13.040466 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:13.040480 kubelet[1921]: E0517 00:50:13.040474 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:13.041220 kubelet[1921]: E0517 00:50:13.040577 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:13.041220 kubelet[1921]: W0517 00:50:13.040591 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:13.041220 kubelet[1921]: E0517 00:50:13.040599 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:13.041220 kubelet[1921]: E0517 00:50:13.040708 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:13.041220 kubelet[1921]: W0517 00:50:13.040715 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:13.041220 kubelet[1921]: E0517 00:50:13.040723 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:13.041220 kubelet[1921]: E0517 00:50:13.040844 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:13.041220 kubelet[1921]: W0517 00:50:13.040851 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:13.041220 kubelet[1921]: E0517 00:50:13.040858 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:13.041220 kubelet[1921]: E0517 00:50:13.041154 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:13.041483 kubelet[1921]: W0517 00:50:13.041162 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:13.041483 kubelet[1921]: E0517 00:50:13.041171 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:13.485856 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2249004345.mount: Deactivated successfully. May 17 00:50:13.793896 kubelet[1921]: E0517 00:50:13.793769 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:50:13.948011 kubelet[1921]: E0517 00:50:13.947970 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:13.948177 kubelet[1921]: W0517 00:50:13.948161 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:13.948252 kubelet[1921]: E0517 00:50:13.948239 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:13.948434 kubelet[1921]: E0517 00:50:13.948422 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:13.948508 kubelet[1921]: W0517 00:50:13.948497 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:13.948562 kubelet[1921]: E0517 00:50:13.948551 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:13.948744 kubelet[1921]: E0517 00:50:13.948732 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:13.948815 kubelet[1921]: W0517 00:50:13.948804 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:13.948878 kubelet[1921]: E0517 00:50:13.948868 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:13.949074 kubelet[1921]: E0517 00:50:13.949064 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:13.949146 kubelet[1921]: W0517 00:50:13.949134 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:13.949210 kubelet[1921]: E0517 00:50:13.949199 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:13.949396 kubelet[1921]: E0517 00:50:13.949385 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:13.949469 kubelet[1921]: W0517 00:50:13.949458 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:13.949531 kubelet[1921]: E0517 00:50:13.949518 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:13.949715 kubelet[1921]: E0517 00:50:13.949703 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:13.949782 kubelet[1921]: W0517 00:50:13.949772 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:13.949836 kubelet[1921]: E0517 00:50:13.949825 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:13.950027 kubelet[1921]: E0517 00:50:13.950014 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:13.950094 kubelet[1921]: W0517 00:50:13.950083 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:13.950160 kubelet[1921]: E0517 00:50:13.950148 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:13.950343 kubelet[1921]: E0517 00:50:13.950332 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:13.950415 kubelet[1921]: W0517 00:50:13.950404 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:13.950475 kubelet[1921]: E0517 00:50:13.950464 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:13.950656 kubelet[1921]: E0517 00:50:13.950646 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:13.950730 kubelet[1921]: W0517 00:50:13.950719 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:13.950789 kubelet[1921]: E0517 00:50:13.950778 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:13.950968 kubelet[1921]: E0517 00:50:13.950956 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:13.951057 kubelet[1921]: W0517 00:50:13.951046 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:13.951109 kubelet[1921]: E0517 00:50:13.951098 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:13.951329 kubelet[1921]: E0517 00:50:13.951317 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:13.951402 kubelet[1921]: W0517 00:50:13.951390 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:13.951473 kubelet[1921]: E0517 00:50:13.951462 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:13.951677 kubelet[1921]: E0517 00:50:13.951666 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:13.951753 kubelet[1921]: W0517 00:50:13.951742 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:13.951806 kubelet[1921]: E0517 00:50:13.951796 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:13.952013 kubelet[1921]: E0517 00:50:13.952002 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:13.952092 kubelet[1921]: W0517 00:50:13.952081 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:13.952154 kubelet[1921]: E0517 00:50:13.952143 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:13.952333 kubelet[1921]: E0517 00:50:13.952323 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:13.952405 kubelet[1921]: W0517 00:50:13.952394 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:13.952465 kubelet[1921]: E0517 00:50:13.952454 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:13.952636 kubelet[1921]: E0517 00:50:13.952626 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:13.952706 kubelet[1921]: W0517 00:50:13.952696 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:13.952766 kubelet[1921]: E0517 00:50:13.952754 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:13.953089 kubelet[1921]: E0517 00:50:13.953077 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:13.953179 kubelet[1921]: W0517 00:50:13.953167 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:13.953238 kubelet[1921]: E0517 00:50:13.953227 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:13.953440 kubelet[1921]: E0517 00:50:13.953429 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:13.953509 kubelet[1921]: W0517 00:50:13.953498 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:13.953570 kubelet[1921]: E0517 00:50:13.953559 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:13.953747 kubelet[1921]: E0517 00:50:13.953736 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:13.953813 kubelet[1921]: W0517 00:50:13.953802 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:13.953866 kubelet[1921]: E0517 00:50:13.953855 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:13.954084 kubelet[1921]: E0517 00:50:13.954071 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:13.954153 kubelet[1921]: W0517 00:50:13.954142 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:13.954222 kubelet[1921]: E0517 00:50:13.954210 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:13.954401 kubelet[1921]: E0517 00:50:13.954390 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:13.954475 kubelet[1921]: W0517 00:50:13.954464 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:13.954533 kubelet[1921]: E0517 00:50:13.954522 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:14.042872 kubelet[1921]: E0517 00:50:14.042848 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:14.043034 kubelet[1921]: W0517 00:50:14.043020 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:14.043124 kubelet[1921]: E0517 00:50:14.043110 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:14.043351 kubelet[1921]: E0517 00:50:14.043340 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:14.043427 kubelet[1921]: W0517 00:50:14.043415 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:14.043491 kubelet[1921]: E0517 00:50:14.043479 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:14.043798 kubelet[1921]: E0517 00:50:14.043779 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:14.043798 kubelet[1921]: W0517 00:50:14.043796 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:14.043936 kubelet[1921]: E0517 00:50:14.043815 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:14.045338 kubelet[1921]: E0517 00:50:14.045315 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:14.045338 kubelet[1921]: W0517 00:50:14.045333 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:14.045457 kubelet[1921]: E0517 00:50:14.045352 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:14.045533 kubelet[1921]: E0517 00:50:14.045519 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:14.045533 kubelet[1921]: W0517 00:50:14.045532 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:14.045639 kubelet[1921]: E0517 00:50:14.045623 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:14.045710 kubelet[1921]: E0517 00:50:14.045651 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:14.045767 kubelet[1921]: W0517 00:50:14.045755 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:14.045832 kubelet[1921]: E0517 00:50:14.045820 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:14.046058 kubelet[1921]: E0517 00:50:14.046044 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:14.046145 kubelet[1921]: W0517 00:50:14.046132 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:14.046212 kubelet[1921]: E0517 00:50:14.046200 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:14.046448 kubelet[1921]: E0517 00:50:14.046398 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:14.046527 kubelet[1921]: W0517 00:50:14.046512 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:14.046601 kubelet[1921]: E0517 00:50:14.046589 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:14.046876 kubelet[1921]: E0517 00:50:14.046857 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:14.046876 kubelet[1921]: W0517 00:50:14.046874 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:14.046953 kubelet[1921]: E0517 00:50:14.046891 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:14.047212 kubelet[1921]: E0517 00:50:14.047199 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:14.047283 kubelet[1921]: W0517 00:50:14.047272 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:14.047349 kubelet[1921]: E0517 00:50:14.047337 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:14.047550 kubelet[1921]: E0517 00:50:14.047530 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:14.047550 kubelet[1921]: W0517 00:50:14.047546 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:14.047614 kubelet[1921]: E0517 00:50:14.047558 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:14.047848 kubelet[1921]: E0517 00:50:14.047835 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:50:14.047920 kubelet[1921]: W0517 00:50:14.047908 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:50:14.048005 kubelet[1921]: E0517 00:50:14.047964 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:50:14.421028 env[1476]: time="2025-05-17T00:50:14.420968781Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:50:14.430649 env[1476]: time="2025-05-17T00:50:14.430615620Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:080eaf4c238c85534b61055c31b109c96ce3d20075391e58988541a442c7c701,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:50:14.436267 env[1476]: time="2025-05-17T00:50:14.436242779Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:50:14.443575 env[1476]: time="2025-05-17T00:50:14.443551338Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:ce76dd87f11d3fd0054c35ad2e0e9f833748d007f77a9bfe859d0ddcb66fcb2c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:50:14.444190 env[1476]: time="2025-05-17T00:50:14.444166578Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\" returns image reference \"sha256:080eaf4c238c85534b61055c31b109c96ce3d20075391e58988541a442c7c701\"" May 17 00:50:14.446599 env[1476]: time="2025-05-17T00:50:14.446574618Z" level=info msg="CreateContainer within sandbox \"61720d5d57f1fc9dc9a4998ad25e87ad59d5cda1fd6616ecada1d4a8cdca7538\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 17 00:50:14.576804 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2762346796.mount: Deactivated successfully. May 17 00:50:14.596692 env[1476]: time="2025-05-17T00:50:14.596632278Z" level=info msg="CreateContainer within sandbox \"61720d5d57f1fc9dc9a4998ad25e87ad59d5cda1fd6616ecada1d4a8cdca7538\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"87aa6c2dae093ee3ec6d68e99538aa560326161a12415c192f0968c6c7685113\"" May 17 00:50:14.597397 env[1476]: time="2025-05-17T00:50:14.597368878Z" level=info msg="StartContainer for \"87aa6c2dae093ee3ec6d68e99538aa560326161a12415c192f0968c6c7685113\"" May 17 00:50:14.618480 systemd[1]: Started cri-containerd-87aa6c2dae093ee3ec6d68e99538aa560326161a12415c192f0968c6c7685113.scope. May 17 00:50:14.634000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:14.634000 audit[2327]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1995 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:14.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837616136633264616530393365653365633664363865393935333861 May 17 00:50:14.634000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:14.634000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:14.634000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:14.634000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:14.634000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:14.634000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:14.634000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:14.634000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:14.634000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:14.634000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:14.634000 audit: BPF prog-id=73 op=LOAD May 17 00:50:14.634000 audit[2327]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1995 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:14.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837616136633264616530393365653365633664363865393935333861 May 17 00:50:14.634000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:14.634000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:14.634000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:14.634000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:14.634000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:14.634000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:14.634000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:14.634000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:14.634000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:14.634000 audit: BPF prog-id=74 op=LOAD May 17 00:50:14.634000 audit[2327]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1995 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:14.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837616136633264616530393365653365633664363865393935333861 May 17 00:50:14.634000 audit: BPF prog-id=74 op=UNLOAD May 17 00:50:14.634000 audit: BPF prog-id=73 op=UNLOAD May 17 00:50:14.634000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:14.634000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:14.634000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:14.634000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:14.634000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:14.634000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:14.634000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:14.634000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:14.634000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:14.634000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:14.634000 audit: BPF prog-id=75 op=LOAD May 17 00:50:14.634000 audit[2327]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1995 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:14.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837616136633264616530393365653365633664363865393935333861 May 17 00:50:14.650348 env[1476]: time="2025-05-17T00:50:14.650292272Z" level=info msg="StartContainer for \"87aa6c2dae093ee3ec6d68e99538aa560326161a12415c192f0968c6c7685113\" returns successfully" May 17 00:50:14.657321 systemd[1]: cri-containerd-87aa6c2dae093ee3ec6d68e99538aa560326161a12415c192f0968c6c7685113.scope: Deactivated successfully. May 17 00:50:14.661000 audit: BPF prog-id=75 op=UNLOAD May 17 00:50:14.965669 kubelet[1921]: E0517 00:50:14.794127 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:50:14.965669 kubelet[1921]: E0517 00:50:14.868824 1921 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wfbrr" podUID="8a14b7c5-5085-44c4-a97d-df8fa59ba1ab" May 17 00:50:14.965669 kubelet[1921]: I0517 00:50:14.917143 1921 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-x8p52" podStartSLOduration=6.180445715 podStartE2EDuration="7.917128077s" podCreationTimestamp="2025-05-17 00:50:07 +0000 UTC" firstStartedPulling="2025-05-17 00:50:10.416212577 +0000 UTC m=+3.733088449" lastFinishedPulling="2025-05-17 00:50:12.152894939 +0000 UTC m=+5.469770811" observedRunningTime="2025-05-17 00:50:12.900874189 +0000 UTC m=+6.217750061" watchObservedRunningTime="2025-05-17 00:50:14.917128077 +0000 UTC m=+8.234003949" May 17 00:50:15.122746 env[1476]: time="2025-05-17T00:50:15.122701731Z" level=info msg="shim disconnected" id=87aa6c2dae093ee3ec6d68e99538aa560326161a12415c192f0968c6c7685113 May 17 00:50:15.122963 env[1476]: time="2025-05-17T00:50:15.122946011Z" level=warning msg="cleaning up after shim disconnected" id=87aa6c2dae093ee3ec6d68e99538aa560326161a12415c192f0968c6c7685113 namespace=k8s.io May 17 00:50:15.123058 env[1476]: time="2025-05-17T00:50:15.123043251Z" level=info msg="cleaning up dead shim" May 17 00:50:15.129784 env[1476]: time="2025-05-17T00:50:15.129752250Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:50:15Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2371 runtime=io.containerd.runc.v2\n" May 17 00:50:15.574115 systemd[1]: run-containerd-runc-k8s.io-87aa6c2dae093ee3ec6d68e99538aa560326161a12415c192f0968c6c7685113-runc.1dAybb.mount: Deactivated successfully. May 17 00:50:15.574203 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-87aa6c2dae093ee3ec6d68e99538aa560326161a12415c192f0968c6c7685113-rootfs.mount: Deactivated successfully. May 17 00:50:15.794860 kubelet[1921]: E0517 00:50:15.794826 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:50:15.886785 env[1476]: time="2025-05-17T00:50:15.886750718Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\"" May 17 00:50:16.795119 kubelet[1921]: E0517 00:50:16.795062 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:50:16.868681 kubelet[1921]: E0517 00:50:16.868637 1921 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wfbrr" podUID="8a14b7c5-5085-44c4-a97d-df8fa59ba1ab" May 17 00:50:17.795773 kubelet[1921]: E0517 00:50:17.795722 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:50:18.796003 kubelet[1921]: E0517 00:50:18.795942 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:50:18.868385 kubelet[1921]: E0517 00:50:18.868332 1921 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wfbrr" podUID="8a14b7c5-5085-44c4-a97d-df8fa59ba1ab" May 17 00:50:19.796523 kubelet[1921]: E0517 00:50:19.796473 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:50:19.881031 env[1476]: time="2025-05-17T00:50:19.880987821Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:50:19.890161 env[1476]: time="2025-05-17T00:50:19.890119540Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0a1b3d5412de2974bc057a3463a132f935c307bc06d5b990ad54031e1f5a351d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:50:19.897665 env[1476]: time="2025-05-17T00:50:19.897625459Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:50:19.907099 env[1476]: time="2025-05-17T00:50:19.907043779Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:3dd06656abdc03fbd51782d5f6fe4d70e6825a1c0c5bce2a165bbd2ff9e0f7df,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:50:19.907777 env[1476]: time="2025-05-17T00:50:19.907748859Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\" returns image reference \"sha256:0a1b3d5412de2974bc057a3463a132f935c307bc06d5b990ad54031e1f5a351d\"" May 17 00:50:19.909874 env[1476]: time="2025-05-17T00:50:19.909843618Z" level=info msg="CreateContainer within sandbox \"61720d5d57f1fc9dc9a4998ad25e87ad59d5cda1fd6616ecada1d4a8cdca7538\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 17 00:50:19.952110 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2800364359.mount: Deactivated successfully. May 17 00:50:19.979487 env[1476]: time="2025-05-17T00:50:19.979441412Z" level=info msg="CreateContainer within sandbox \"61720d5d57f1fc9dc9a4998ad25e87ad59d5cda1fd6616ecada1d4a8cdca7538\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"f12b107ce36cfc824e798031dadf56dea2d9b78d269e936c08b98ac5c08f46dc\"" May 17 00:50:19.980260 env[1476]: time="2025-05-17T00:50:19.980230772Z" level=info msg="StartContainer for \"f12b107ce36cfc824e798031dadf56dea2d9b78d269e936c08b98ac5c08f46dc\"" May 17 00:50:20.002842 systemd[1]: Started cri-containerd-f12b107ce36cfc824e798031dadf56dea2d9b78d269e936c08b98ac5c08f46dc.scope. May 17 00:50:20.037138 kernel: kauditd_printk_skb: 410 callbacks suppressed May 17 00:50:20.037253 kernel: audit: type=1400 audit(1747443020.014:529): avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:20.014000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:20.014000 audit[2395]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1995 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:20.065856 kernel: audit: type=1300 audit(1747443020.014:529): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1995 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:20.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631326231303763653336636663383234653739383033316461646635 May 17 00:50:20.014000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:20.111758 kernel: audit: type=1327 audit(1747443020.014:529): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631326231303763653336636663383234653739383033316461646635 May 17 00:50:20.111837 kernel: audit: type=1400 audit(1747443020.014:530): avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:20.014000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:20.129982 kernel: audit: type=1400 audit(1747443020.014:530): avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:20.014000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:20.148275 kernel: audit: type=1400 audit(1747443020.014:530): avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:20.014000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:20.167254 kernel: audit: type=1400 audit(1747443020.014:530): avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:20.014000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:20.186348 kernel: audit: type=1400 audit(1747443020.014:530): avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:20.186608 env[1476]: time="2025-05-17T00:50:20.186570593Z" level=info msg="StartContainer for \"f12b107ce36cfc824e798031dadf56dea2d9b78d269e936c08b98ac5c08f46dc\" returns successfully" May 17 00:50:20.014000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:20.204357 kernel: audit: type=1400 audit(1747443020.014:530): avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:20.014000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:20.224012 kernel: audit: type=1400 audit(1747443020.014:530): avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:20.014000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:20.014000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:20.014000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:20.014000 audit: BPF prog-id=76 op=LOAD May 17 00:50:20.014000 audit[2395]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1995 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:20.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631326231303763653336636663383234653739383033316461646635 May 17 00:50:20.019000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:20.019000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:20.019000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:20.019000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:20.019000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:20.019000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:20.019000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:20.019000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:20.019000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:20.019000 audit: BPF prog-id=77 op=LOAD May 17 00:50:20.019000 audit[2395]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1995 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:20.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631326231303763653336636663383234653739383033316461646635 May 17 00:50:20.036000 audit: BPF prog-id=77 op=UNLOAD May 17 00:50:20.036000 audit: BPF prog-id=76 op=UNLOAD May 17 00:50:20.036000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:20.036000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:20.036000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:20.036000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:20.036000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:20.036000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:20.036000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:20.036000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:20.036000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:20.036000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:20.036000 audit: BPF prog-id=78 op=LOAD May 17 00:50:20.036000 audit[2395]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1995 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:20.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631326231303763653336636663383234653739383033316461646635 May 17 00:50:20.797020 kubelet[1921]: E0517 00:50:20.796967 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:50:20.868920 kubelet[1921]: E0517 00:50:20.868883 1921 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wfbrr" podUID="8a14b7c5-5085-44c4-a97d-df8fa59ba1ab" May 17 00:50:20.950091 systemd[1]: run-containerd-runc-k8s.io-f12b107ce36cfc824e798031dadf56dea2d9b78d269e936c08b98ac5c08f46dc-runc.ZlqHIW.mount: Deactivated successfully. May 17 00:50:21.351500 env[1476]: time="2025-05-17T00:50:21.351439333Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 17 00:50:21.353891 systemd[1]: cri-containerd-f12b107ce36cfc824e798031dadf56dea2d9b78d269e936c08b98ac5c08f46dc.scope: Deactivated successfully. May 17 00:50:21.357000 audit: BPF prog-id=78 op=UNLOAD May 17 00:50:21.371555 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-f12b107ce36cfc824e798031dadf56dea2d9b78d269e936c08b98ac5c08f46dc-rootfs.mount: Deactivated successfully. May 17 00:50:21.434213 kubelet[1921]: I0517 00:50:21.434179 1921 kubelet_node_status.go:488] "Fast updating node status as it just became ready" May 17 00:50:21.798079 kubelet[1921]: E0517 00:50:21.797965 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:50:22.225824 env[1476]: time="2025-05-17T00:50:22.225774142Z" level=info msg="shim disconnected" id=f12b107ce36cfc824e798031dadf56dea2d9b78d269e936c08b98ac5c08f46dc May 17 00:50:22.225824 env[1476]: time="2025-05-17T00:50:22.225820222Z" level=warning msg="cleaning up after shim disconnected" id=f12b107ce36cfc824e798031dadf56dea2d9b78d269e936c08b98ac5c08f46dc namespace=k8s.io May 17 00:50:22.225824 env[1476]: time="2025-05-17T00:50:22.225830782Z" level=info msg="cleaning up dead shim" May 17 00:50:22.232188 env[1476]: time="2025-05-17T00:50:22.232145381Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:50:22Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2434 runtime=io.containerd.runc.v2\n" May 17 00:50:22.798291 kubelet[1921]: E0517 00:50:22.798251 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:50:22.872439 systemd[1]: Created slice kubepods-besteffort-pod8a14b7c5_5085_44c4_a97d_df8fa59ba1ab.slice. May 17 00:50:22.874898 env[1476]: time="2025-05-17T00:50:22.874859692Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wfbrr,Uid:8a14b7c5-5085-44c4-a97d-df8fa59ba1ab,Namespace:calico-system,Attempt:0,}" May 17 00:50:22.901102 env[1476]: time="2025-05-17T00:50:22.901068610Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\"" May 17 00:50:22.970711 env[1476]: time="2025-05-17T00:50:22.970643164Z" level=error msg="Failed to destroy network for sandbox \"609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:50:22.972094 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921-shm.mount: Deactivated successfully. May 17 00:50:22.974326 env[1476]: time="2025-05-17T00:50:22.973313084Z" level=error msg="encountered an error cleaning up failed sandbox \"609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:50:22.974326 env[1476]: time="2025-05-17T00:50:22.973370124Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wfbrr,Uid:8a14b7c5-5085-44c4-a97d-df8fa59ba1ab,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:50:22.974439 kubelet[1921]: E0517 00:50:22.973585 1921 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:50:22.974439 kubelet[1921]: E0517 00:50:22.973658 1921 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-wfbrr" May 17 00:50:22.974439 kubelet[1921]: E0517 00:50:22.973681 1921 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-wfbrr" May 17 00:50:22.974572 kubelet[1921]: E0517 00:50:22.973730 1921 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-wfbrr_calico-system(8a14b7c5-5085-44c4-a97d-df8fa59ba1ab)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-wfbrr_calico-system(8a14b7c5-5085-44c4-a97d-df8fa59ba1ab)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-wfbrr" podUID="8a14b7c5-5085-44c4-a97d-df8fa59ba1ab" May 17 00:50:23.799274 kubelet[1921]: E0517 00:50:23.799231 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:50:23.902471 kubelet[1921]: I0517 00:50:23.902440 1921 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921" May 17 00:50:23.903308 env[1476]: time="2025-05-17T00:50:23.903273856Z" level=info msg="StopPodSandbox for \"609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921\"" May 17 00:50:23.937097 env[1476]: time="2025-05-17T00:50:23.937043974Z" level=error msg="StopPodSandbox for \"609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921\" failed" error="failed to destroy network for sandbox \"609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:50:23.937542 kubelet[1921]: E0517 00:50:23.937499 1921 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921" May 17 00:50:23.937646 kubelet[1921]: E0517 00:50:23.937558 1921 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921"} May 17 00:50:23.937646 kubelet[1921]: E0517 00:50:23.937612 1921 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8a14b7c5-5085-44c4-a97d-df8fa59ba1ab\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:50:23.937646 kubelet[1921]: E0517 00:50:23.937633 1921 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8a14b7c5-5085-44c4-a97d-df8fa59ba1ab\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-wfbrr" podUID="8a14b7c5-5085-44c4-a97d-df8fa59ba1ab" May 17 00:50:24.800182 kubelet[1921]: E0517 00:50:24.800143 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:50:25.800634 kubelet[1921]: E0517 00:50:25.800589 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:50:26.800956 kubelet[1921]: E0517 00:50:26.800914 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:50:27.764145 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3416818503.mount: Deactivated successfully. May 17 00:50:27.772431 kubelet[1921]: E0517 00:50:27.772385 1921 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:50:27.802029 kubelet[1921]: E0517 00:50:27.801993 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:50:27.828791 env[1476]: time="2025-05-17T00:50:27.828750897Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:50:27.839009 env[1476]: time="2025-05-17T00:50:27.838956342Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f7148fde8e28b27da58f84cac134cdc53b5df321cda13c660192f06839670732,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:50:27.845529 env[1476]: time="2025-05-17T00:50:27.845491259Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:50:27.850727 env[1476]: time="2025-05-17T00:50:27.850702714Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:7cb61ea47ca0a8e6d0526a42da4f1e399b37ccd13339d0776d272465cb7ee012,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:50:27.851090 env[1476]: time="2025-05-17T00:50:27.851059127Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\" returns image reference \"sha256:f7148fde8e28b27da58f84cac134cdc53b5df321cda13c660192f06839670732\"" May 17 00:50:27.863429 env[1476]: time="2025-05-17T00:50:27.863374816Z" level=info msg="CreateContainer within sandbox \"61720d5d57f1fc9dc9a4998ad25e87ad59d5cda1fd6616ecada1d4a8cdca7538\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 17 00:50:27.930423 env[1476]: time="2025-05-17T00:50:27.930367221Z" level=info msg="CreateContainer within sandbox \"61720d5d57f1fc9dc9a4998ad25e87ad59d5cda1fd6616ecada1d4a8cdca7538\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"3bf8248740ac8850ca1033bbdd9f472dcaa5a638aa4a2e391e4cd84d6700c665\"" May 17 00:50:27.931248 env[1476]: time="2025-05-17T00:50:27.931218158Z" level=info msg="StartContainer for \"3bf8248740ac8850ca1033bbdd9f472dcaa5a638aa4a2e391e4cd84d6700c665\"" May 17 00:50:27.945714 systemd[1]: Started cri-containerd-3bf8248740ac8850ca1033bbdd9f472dcaa5a638aa4a2e391e4cd84d6700c665.scope. May 17 00:50:27.960000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:27.968138 kernel: kauditd_printk_skb: 34 callbacks suppressed May 17 00:50:27.968216 kernel: audit: type=1400 audit(1747443027.960:536): avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:27.960000 audit[2500]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1995 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:28.011605 kernel: audit: type=1300 audit(1747443027.960:536): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1995 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:27.960000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362663832343837343061633838353063613130333362626464396634 May 17 00:50:28.035180 kernel: audit: type=1327 audit(1747443027.960:536): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362663832343837343061633838353063613130333362626464396634 May 17 00:50:27.960000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:28.052078 kernel: audit: type=1400 audit(1747443027.960:537): avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:27.960000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:28.071987 kernel: audit: type=1400 audit(1747443027.960:537): avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:27.960000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:28.090736 kernel: audit: type=1400 audit(1747443027.960:537): avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:27.960000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:28.109012 kernel: audit: type=1400 audit(1747443027.960:537): avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:28.110717 env[1476]: time="2025-05-17T00:50:28.110655786Z" level=info msg="StartContainer for \"3bf8248740ac8850ca1033bbdd9f472dcaa5a638aa4a2e391e4cd84d6700c665\" returns successfully" May 17 00:50:27.960000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:28.128762 kernel: audit: type=1400 audit(1747443027.960:537): avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:27.960000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:27.960000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:28.163132 kernel: audit: type=1400 audit(1747443027.960:537): avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:28.163201 kernel: audit: type=1400 audit(1747443027.960:537): avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:27.960000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:27.960000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:27.960000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:27.960000 audit: BPF prog-id=79 op=LOAD May 17 00:50:27.960000 audit[2500]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1995 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:27.960000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362663832343837343061633838353063613130333362626464396634 May 17 00:50:27.961000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:27.961000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:27.961000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:27.961000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:27.961000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:27.961000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:27.961000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:27.961000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:27.961000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:27.961000 audit: BPF prog-id=80 op=LOAD May 17 00:50:27.961000 audit[2500]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1995 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:27.961000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362663832343837343061633838353063613130333362626464396634 May 17 00:50:27.961000 audit: BPF prog-id=80 op=UNLOAD May 17 00:50:27.961000 audit: BPF prog-id=79 op=UNLOAD May 17 00:50:27.961000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:27.961000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:27.961000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:27.961000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:27.961000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:27.961000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:27.961000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:27.961000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:27.961000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:27.961000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:27.961000 audit: BPF prog-id=81 op=LOAD May 17 00:50:27.961000 audit[2500]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1995 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:27.961000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362663832343837343061633838353063613130333362626464396634 May 17 00:50:28.368796 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 17 00:50:28.368914 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 17 00:50:28.416136 systemd[1]: Created slice kubepods-besteffort-podd9b3405c_87d9_49b6_8139_8dcbf910b61a.slice. May 17 00:50:28.523112 kubelet[1921]: I0517 00:50:28.523068 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-h7qz5\" (UniqueName: \"kubernetes.io/projected/d9b3405c-87d9-49b6-8139-8dcbf910b61a-kube-api-access-h7qz5\") pod \"nginx-deployment-8587fbcb89-bdd7l\" (UID: \"d9b3405c-87d9-49b6-8139-8dcbf910b61a\") " pod="default/nginx-deployment-8587fbcb89-bdd7l" May 17 00:50:28.720578 env[1476]: time="2025-05-17T00:50:28.720465762Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-bdd7l,Uid:d9b3405c-87d9-49b6-8139-8dcbf910b61a,Namespace:default,Attempt:0,}" May 17 00:50:28.802999 kubelet[1921]: E0517 00:50:28.802939 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:50:28.890041 systemd-networkd[1629]: cali071ec9989b6: Link UP May 17 00:50:28.904322 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:50:28.904433 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali071ec9989b6: link becomes ready May 17 00:50:28.904833 systemd-networkd[1629]: cali071ec9989b6: Gained carrier May 17 00:50:28.921093 env[1476]: 2025-05-17 00:50:28.789 [INFO][2557] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 17 00:50:28.921093 env[1476]: 2025-05-17 00:50:28.804 [INFO][2557] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.28-k8s-nginx--deployment--8587fbcb89--bdd7l-eth0 nginx-deployment-8587fbcb89- default d9b3405c-87d9-49b6-8139-8dcbf910b61a 1423 0 2025-05-17 00:50:28 +0000 UTC map[app:nginx pod-template-hash:8587fbcb89 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.28 nginx-deployment-8587fbcb89-bdd7l eth0 default [] [] [kns.default ksa.default.default] cali071ec9989b6 [] [] }} ContainerID="c590ecee46221fde1c9129472202c6635a55b0c7fa668ad68b0e127a58a0f18c" Namespace="default" Pod="nginx-deployment-8587fbcb89-bdd7l" WorkloadEndpoint="10.200.20.28-k8s-nginx--deployment--8587fbcb89--bdd7l-" May 17 00:50:28.921093 env[1476]: 2025-05-17 00:50:28.805 [INFO][2557] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="c590ecee46221fde1c9129472202c6635a55b0c7fa668ad68b0e127a58a0f18c" Namespace="default" Pod="nginx-deployment-8587fbcb89-bdd7l" WorkloadEndpoint="10.200.20.28-k8s-nginx--deployment--8587fbcb89--bdd7l-eth0" May 17 00:50:28.921093 env[1476]: 2025-05-17 00:50:28.827 [INFO][2570] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c590ecee46221fde1c9129472202c6635a55b0c7fa668ad68b0e127a58a0f18c" HandleID="k8s-pod-network.c590ecee46221fde1c9129472202c6635a55b0c7fa668ad68b0e127a58a0f18c" Workload="10.200.20.28-k8s-nginx--deployment--8587fbcb89--bdd7l-eth0" May 17 00:50:28.921093 env[1476]: 2025-05-17 00:50:28.827 [INFO][2570] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c590ecee46221fde1c9129472202c6635a55b0c7fa668ad68b0e127a58a0f18c" HandleID="k8s-pod-network.c590ecee46221fde1c9129472202c6635a55b0c7fa668ad68b0e127a58a0f18c" Workload="10.200.20.28-k8s-nginx--deployment--8587fbcb89--bdd7l-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000321510), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.28", "pod":"nginx-deployment-8587fbcb89-bdd7l", "timestamp":"2025-05-17 00:50:28.82752994 +0000 UTC"}, Hostname:"10.200.20.28", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:50:28.921093 env[1476]: 2025-05-17 00:50:28.827 [INFO][2570] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:50:28.921093 env[1476]: 2025-05-17 00:50:28.827 [INFO][2570] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:50:28.921093 env[1476]: 2025-05-17 00:50:28.827 [INFO][2570] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.28' May 17 00:50:28.921093 env[1476]: 2025-05-17 00:50:28.840 [INFO][2570] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.c590ecee46221fde1c9129472202c6635a55b0c7fa668ad68b0e127a58a0f18c" host="10.200.20.28" May 17 00:50:28.921093 env[1476]: 2025-05-17 00:50:28.844 [INFO][2570] ipam/ipam.go 394: Looking up existing affinities for host host="10.200.20.28" May 17 00:50:28.921093 env[1476]: 2025-05-17 00:50:28.848 [INFO][2570] ipam/ipam.go 511: Trying affinity for 192.168.124.0/26 host="10.200.20.28" May 17 00:50:28.921093 env[1476]: 2025-05-17 00:50:28.850 [INFO][2570] ipam/ipam.go 158: Attempting to load block cidr=192.168.124.0/26 host="10.200.20.28" May 17 00:50:28.921093 env[1476]: 2025-05-17 00:50:28.851 [INFO][2570] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.124.0/26 host="10.200.20.28" May 17 00:50:28.921093 env[1476]: 2025-05-17 00:50:28.852 [INFO][2570] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.124.0/26 handle="k8s-pod-network.c590ecee46221fde1c9129472202c6635a55b0c7fa668ad68b0e127a58a0f18c" host="10.200.20.28" May 17 00:50:28.921093 env[1476]: 2025-05-17 00:50:28.853 [INFO][2570] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.c590ecee46221fde1c9129472202c6635a55b0c7fa668ad68b0e127a58a0f18c May 17 00:50:28.921093 env[1476]: 2025-05-17 00:50:28.857 [INFO][2570] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.124.0/26 handle="k8s-pod-network.c590ecee46221fde1c9129472202c6635a55b0c7fa668ad68b0e127a58a0f18c" host="10.200.20.28" May 17 00:50:28.921093 env[1476]: 2025-05-17 00:50:28.865 [INFO][2570] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.124.1/26] block=192.168.124.0/26 handle="k8s-pod-network.c590ecee46221fde1c9129472202c6635a55b0c7fa668ad68b0e127a58a0f18c" host="10.200.20.28" May 17 00:50:28.921093 env[1476]: 2025-05-17 00:50:28.865 [INFO][2570] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.124.1/26] handle="k8s-pod-network.c590ecee46221fde1c9129472202c6635a55b0c7fa668ad68b0e127a58a0f18c" host="10.200.20.28" May 17 00:50:28.921093 env[1476]: 2025-05-17 00:50:28.865 [INFO][2570] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:50:28.921093 env[1476]: 2025-05-17 00:50:28.865 [INFO][2570] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.124.1/26] IPv6=[] ContainerID="c590ecee46221fde1c9129472202c6635a55b0c7fa668ad68b0e127a58a0f18c" HandleID="k8s-pod-network.c590ecee46221fde1c9129472202c6635a55b0c7fa668ad68b0e127a58a0f18c" Workload="10.200.20.28-k8s-nginx--deployment--8587fbcb89--bdd7l-eth0" May 17 00:50:28.921809 env[1476]: 2025-05-17 00:50:28.867 [INFO][2557] cni-plugin/k8s.go 418: Populated endpoint ContainerID="c590ecee46221fde1c9129472202c6635a55b0c7fa668ad68b0e127a58a0f18c" Namespace="default" Pod="nginx-deployment-8587fbcb89-bdd7l" WorkloadEndpoint="10.200.20.28-k8s-nginx--deployment--8587fbcb89--bdd7l-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.28-k8s-nginx--deployment--8587fbcb89--bdd7l-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"d9b3405c-87d9-49b6-8139-8dcbf910b61a", ResourceVersion:"1423", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 50, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.28", ContainerID:"", Pod:"nginx-deployment-8587fbcb89-bdd7l", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.124.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali071ec9989b6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:50:28.921809 env[1476]: 2025-05-17 00:50:28.867 [INFO][2557] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.124.1/32] ContainerID="c590ecee46221fde1c9129472202c6635a55b0c7fa668ad68b0e127a58a0f18c" Namespace="default" Pod="nginx-deployment-8587fbcb89-bdd7l" WorkloadEndpoint="10.200.20.28-k8s-nginx--deployment--8587fbcb89--bdd7l-eth0" May 17 00:50:28.921809 env[1476]: 2025-05-17 00:50:28.867 [INFO][2557] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali071ec9989b6 ContainerID="c590ecee46221fde1c9129472202c6635a55b0c7fa668ad68b0e127a58a0f18c" Namespace="default" Pod="nginx-deployment-8587fbcb89-bdd7l" WorkloadEndpoint="10.200.20.28-k8s-nginx--deployment--8587fbcb89--bdd7l-eth0" May 17 00:50:28.921809 env[1476]: 2025-05-17 00:50:28.906 [INFO][2557] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c590ecee46221fde1c9129472202c6635a55b0c7fa668ad68b0e127a58a0f18c" Namespace="default" Pod="nginx-deployment-8587fbcb89-bdd7l" WorkloadEndpoint="10.200.20.28-k8s-nginx--deployment--8587fbcb89--bdd7l-eth0" May 17 00:50:28.921809 env[1476]: 2025-05-17 00:50:28.906 [INFO][2557] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="c590ecee46221fde1c9129472202c6635a55b0c7fa668ad68b0e127a58a0f18c" Namespace="default" Pod="nginx-deployment-8587fbcb89-bdd7l" WorkloadEndpoint="10.200.20.28-k8s-nginx--deployment--8587fbcb89--bdd7l-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.28-k8s-nginx--deployment--8587fbcb89--bdd7l-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"d9b3405c-87d9-49b6-8139-8dcbf910b61a", ResourceVersion:"1423", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 50, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.28", ContainerID:"c590ecee46221fde1c9129472202c6635a55b0c7fa668ad68b0e127a58a0f18c", Pod:"nginx-deployment-8587fbcb89-bdd7l", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.124.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali071ec9989b6", MAC:"be:13:ac:3f:5c:d8", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:50:28.921809 env[1476]: 2025-05-17 00:50:28.917 [INFO][2557] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="c590ecee46221fde1c9129472202c6635a55b0c7fa668ad68b0e127a58a0f18c" Namespace="default" Pod="nginx-deployment-8587fbcb89-bdd7l" WorkloadEndpoint="10.200.20.28-k8s-nginx--deployment--8587fbcb89--bdd7l-eth0" May 17 00:50:28.930643 systemd[1]: run-containerd-runc-k8s.io-3bf8248740ac8850ca1033bbdd9f472dcaa5a638aa4a2e391e4cd84d6700c665-runc.GV3dzS.mount: Deactivated successfully. May 17 00:50:28.943351 env[1476]: time="2025-05-17T00:50:28.940689481Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:50:28.943351 env[1476]: time="2025-05-17T00:50:28.940732158Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:50:28.943351 env[1476]: time="2025-05-17T00:50:28.940742597Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:50:28.943351 env[1476]: time="2025-05-17T00:50:28.940841550Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c590ecee46221fde1c9129472202c6635a55b0c7fa668ad68b0e127a58a0f18c pid=2604 runtime=io.containerd.runc.v2 May 17 00:50:28.961425 systemd[1]: Started cri-containerd-c590ecee46221fde1c9129472202c6635a55b0c7fa668ad68b0e127a58a0f18c.scope. May 17 00:50:28.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:28.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:28.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:28.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:28.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:28.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:28.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:28.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:28.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:28.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:28.978000 audit: BPF prog-id=82 op=LOAD May 17 00:50:28.979000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:28.979000 audit[2621]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2604 pid=2621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:28.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335393065636565343632323166646531633931323934373232303263 May 17 00:50:28.979000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:28.979000 audit[2621]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2604 pid=2621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:28.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335393065636565343632323166646531633931323934373232303263 May 17 00:50:28.980000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:28.980000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:28.980000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:28.980000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:28.980000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:28.980000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:28.980000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:28.980000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:28.980000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:28.980000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:28.980000 audit: BPF prog-id=83 op=LOAD May 17 00:50:28.980000 audit[2621]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2604 pid=2621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:28.980000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335393065636565343632323166646531633931323934373232303263 May 17 00:50:28.981000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:28.981000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:28.981000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:28.981000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:28.981000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:28.981000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:28.981000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:28.981000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:28.981000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:28.981000 audit: BPF prog-id=84 op=LOAD May 17 00:50:28.981000 audit[2621]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2604 pid=2621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:28.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335393065636565343632323166646531633931323934373232303263 May 17 00:50:28.981000 audit: BPF prog-id=84 op=UNLOAD May 17 00:50:28.982000 audit: BPF prog-id=83 op=UNLOAD May 17 00:50:28.982000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:28.982000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:28.982000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:28.982000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:28.982000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:28.982000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:28.982000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:28.982000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:28.982000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:28.982000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:28.982000 audit: BPF prog-id=85 op=LOAD May 17 00:50:28.982000 audit[2621]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2604 pid=2621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:28.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335393065636565343632323166646531633931323934373232303263 May 17 00:50:29.005333 env[1476]: time="2025-05-17T00:50:29.005296722Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-bdd7l,Uid:d9b3405c-87d9-49b6-8139-8dcbf910b61a,Namespace:default,Attempt:0,} returns sandbox id \"c590ecee46221fde1c9129472202c6635a55b0c7fa668ad68b0e127a58a0f18c\"" May 17 00:50:29.007329 env[1476]: time="2025-05-17T00:50:29.007271344Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 17 00:50:29.665000 audit[2688]: AVC avc: denied { write } for pid=2688 comm="tee" name="fd" dev="proc" ino=18704 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:50:29.665000 audit[2688]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd96d97e5 a2=241 a3=1b6 items=1 ppid=2654 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:29.665000 audit: CWD cwd="/etc/service/enabled/cni/log" May 17 00:50:29.665000 audit: PATH item=0 name="/dev/fd/63" inode=18692 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:50:29.665000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:50:29.666000 audit[2700]: AVC avc: denied { write } for pid=2700 comm="tee" name="fd" dev="proc" ino=17960 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:50:29.677000 audit[2704]: AVC avc: denied { write } for pid=2704 comm="tee" name="fd" dev="proc" ino=18717 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:50:29.677000 audit[2704]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc879e7d4 a2=241 a3=1b6 items=1 ppid=2664 pid=2704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:29.677000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 17 00:50:29.677000 audit: PATH item=0 name="/dev/fd/63" inode=18710 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:50:29.677000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:50:29.666000 audit[2700]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffefbca7e3 a2=241 a3=1b6 items=1 ppid=2659 pid=2700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:29.666000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 17 00:50:29.666000 audit: PATH item=0 name="/dev/fd/63" inode=17951 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:50:29.666000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:50:29.685000 audit[2707]: AVC avc: denied { write } for pid=2707 comm="tee" name="fd" dev="proc" ino=17973 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:50:29.685000 audit[2702]: AVC avc: denied { write } for pid=2702 comm="tee" name="fd" dev="proc" ino=18723 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:50:29.685000 audit[2702]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd5d3e7e3 a2=241 a3=1b6 items=1 ppid=2661 pid=2702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:29.685000 audit: CWD cwd="/etc/service/enabled/confd/log" May 17 00:50:29.685000 audit: PATH item=0 name="/dev/fd/63" inode=17961 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:50:29.685000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:50:29.689000 audit[2714]: AVC avc: denied { write } for pid=2714 comm="tee" name="fd" dev="proc" ino=18728 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:50:29.689000 audit[2714]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd0d587d3 a2=241 a3=1b6 items=1 ppid=2658 pid=2714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:29.689000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 17 00:50:29.689000 audit: PATH item=0 name="/dev/fd/63" inode=17969 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:50:29.689000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:50:29.685000 audit[2707]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffcf8f57e4 a2=241 a3=1b6 items=1 ppid=2662 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:29.685000 audit: CWD cwd="/etc/service/enabled/bird/log" May 17 00:50:29.685000 audit: PATH item=0 name="/dev/fd/63" inode=17962 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:50:29.685000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:50:29.696000 audit[2725]: AVC avc: denied { write } for pid=2725 comm="tee" name="fd" dev="proc" ino=18734 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:50:29.696000 audit[2725]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffee5c37e3 a2=241 a3=1b6 items=1 ppid=2682 pid=2725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:29.696000 audit: CWD cwd="/etc/service/enabled/felix/log" May 17 00:50:29.696000 audit: PATH item=0 name="/dev/fd/63" inode=18725 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:50:29.696000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:50:29.803616 kubelet[1921]: E0517 00:50:29.803554 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:50:29.906000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.906000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.906000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.906000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.906000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.906000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.906000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.906000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.906000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.906000 audit: BPF prog-id=86 op=LOAD May 17 00:50:29.906000 audit[2761]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff7d7cdc8 a2=98 a3=fffff7d7cdb8 items=0 ppid=2684 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:29.906000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:50:29.907000 audit: BPF prog-id=86 op=UNLOAD May 17 00:50:29.907000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.907000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.907000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.907000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.907000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.907000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.907000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.907000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.907000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.907000 audit: BPF prog-id=87 op=LOAD May 17 00:50:29.907000 audit[2761]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff7d7ca58 a2=74 a3=95 items=0 ppid=2684 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:29.907000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:50:29.908000 audit: BPF prog-id=87 op=UNLOAD May 17 00:50:29.908000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.908000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.908000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.908000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.908000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.908000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.908000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.908000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.908000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:29.908000 audit: BPF prog-id=88 op=LOAD May 17 00:50:29.908000 audit[2761]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff7d7cab8 a2=94 a3=2 items=0 ppid=2684 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:29.908000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:50:29.909000 audit: BPF prog-id=88 op=UNLOAD May 17 00:50:29.934322 systemd[1]: run-containerd-runc-k8s.io-3bf8248740ac8850ca1033bbdd9f472dcaa5a638aa4a2e391e4cd84d6700c665-runc.LyXi8W.mount: Deactivated successfully. May 17 00:50:30.025000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.025000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.025000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.025000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.025000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.025000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.025000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.025000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.025000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.025000 audit: BPF prog-id=89 op=LOAD May 17 00:50:30.025000 audit[2761]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff7d7ca78 a2=40 a3=fffff7d7caa8 items=0 ppid=2684 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.025000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:50:30.025000 audit: BPF prog-id=89 op=UNLOAD May 17 00:50:30.025000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.025000 audit[2761]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=fffff7d7cb90 a2=50 a3=0 items=0 ppid=2684 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.025000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:50:30.034000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.034000 audit[2761]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff7d7cae8 a2=28 a3=fffff7d7cc18 items=0 ppid=2684 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.034000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:50:30.034000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.034000 audit[2761]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff7d7cb18 a2=28 a3=fffff7d7cc48 items=0 ppid=2684 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.034000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:50:30.034000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.034000 audit[2761]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff7d7c9c8 a2=28 a3=fffff7d7caf8 items=0 ppid=2684 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.034000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:50:30.034000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.034000 audit[2761]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff7d7cb38 a2=28 a3=fffff7d7cc68 items=0 ppid=2684 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.034000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:50:30.034000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.034000 audit[2761]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff7d7cb18 a2=28 a3=fffff7d7cc48 items=0 ppid=2684 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.034000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:50:30.034000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.034000 audit[2761]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff7d7cb08 a2=28 a3=fffff7d7cc38 items=0 ppid=2684 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.034000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:50:30.034000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.034000 audit[2761]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff7d7cb38 a2=28 a3=fffff7d7cc68 items=0 ppid=2684 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.034000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:50:30.034000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.034000 audit[2761]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff7d7cb18 a2=28 a3=fffff7d7cc48 items=0 ppid=2684 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.034000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:50:30.034000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.034000 audit[2761]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff7d7cb38 a2=28 a3=fffff7d7cc68 items=0 ppid=2684 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.034000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:50:30.034000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.034000 audit[2761]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff7d7cb08 a2=28 a3=fffff7d7cc38 items=0 ppid=2684 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.034000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:50:30.034000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.034000 audit[2761]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff7d7cb88 a2=28 a3=fffff7d7ccc8 items=0 ppid=2684 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.034000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:50:30.035000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.035000 audit[2761]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffff7d7c8c0 a2=50 a3=0 items=0 ppid=2684 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.035000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:50:30.035000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.035000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.035000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.035000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.035000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.035000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.035000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.035000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.035000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.035000 audit: BPF prog-id=90 op=LOAD May 17 00:50:30.035000 audit[2761]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffff7d7c8c8 a2=94 a3=5 items=0 ppid=2684 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.035000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:50:30.035000 audit: BPF prog-id=90 op=UNLOAD May 17 00:50:30.035000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.035000 audit[2761]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffff7d7c9d0 a2=50 a3=0 items=0 ppid=2684 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.035000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:50:30.035000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.035000 audit[2761]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=fffff7d7cb18 a2=4 a3=3 items=0 ppid=2684 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.035000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:50:30.035000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.035000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.035000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.035000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.035000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.035000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.035000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.035000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.035000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.035000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.035000 audit[2761]: AVC avc: denied { confidentiality } for pid=2761 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:50:30.035000 audit[2761]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff7d7caf8 a2=94 a3=6 items=0 ppid=2684 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.035000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:50:30.035000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.035000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.035000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.035000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.035000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.035000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.035000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.035000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.035000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.035000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.035000 audit[2761]: AVC avc: denied { confidentiality } for pid=2761 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:50:30.035000 audit[2761]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff7d7c2c8 a2=94 a3=83 items=0 ppid=2684 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.035000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:50:30.035000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.035000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.035000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.035000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.035000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.035000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.035000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.035000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.035000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.035000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.035000 audit[2761]: AVC avc: denied { confidentiality } for pid=2761 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:50:30.035000 audit[2761]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff7d7c2c8 a2=94 a3=83 items=0 ppid=2684 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.035000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:50:30.043000 audit[2786]: AVC avc: denied { bpf } for pid=2786 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.043000 audit[2786]: AVC avc: denied { bpf } for pid=2786 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.043000 audit[2786]: AVC avc: denied { perfmon } for pid=2786 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.043000 audit[2786]: AVC avc: denied { perfmon } for pid=2786 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.043000 audit[2786]: AVC avc: denied { perfmon } for pid=2786 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.043000 audit[2786]: AVC avc: denied { perfmon } for pid=2786 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.043000 audit[2786]: AVC avc: denied { perfmon } for pid=2786 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.043000 audit[2786]: AVC avc: denied { bpf } for pid=2786 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.043000 audit[2786]: AVC avc: denied { bpf } for pid=2786 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.043000 audit: BPF prog-id=91 op=LOAD May 17 00:50:30.043000 audit[2786]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc0db7108 a2=98 a3=ffffc0db70f8 items=0 ppid=2684 pid=2786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.043000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:50:30.044000 audit: BPF prog-id=91 op=UNLOAD May 17 00:50:30.044000 audit[2786]: AVC avc: denied { bpf } for pid=2786 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.044000 audit[2786]: AVC avc: denied { bpf } for pid=2786 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.044000 audit[2786]: AVC avc: denied { perfmon } for pid=2786 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.044000 audit[2786]: AVC avc: denied { perfmon } for pid=2786 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.044000 audit[2786]: AVC avc: denied { perfmon } for pid=2786 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.044000 audit[2786]: AVC avc: denied { perfmon } for pid=2786 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.044000 audit[2786]: AVC avc: denied { perfmon } for pid=2786 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.044000 audit[2786]: AVC avc: denied { bpf } for pid=2786 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.044000 audit[2786]: AVC avc: denied { bpf } for pid=2786 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.044000 audit: BPF prog-id=92 op=LOAD May 17 00:50:30.044000 audit[2786]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc0db6fb8 a2=74 a3=95 items=0 ppid=2684 pid=2786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.044000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:50:30.044000 audit: BPF prog-id=92 op=UNLOAD May 17 00:50:30.044000 audit[2786]: AVC avc: denied { bpf } for pid=2786 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.044000 audit[2786]: AVC avc: denied { bpf } for pid=2786 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.044000 audit[2786]: AVC avc: denied { perfmon } for pid=2786 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.044000 audit[2786]: AVC avc: denied { perfmon } for pid=2786 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.044000 audit[2786]: AVC avc: denied { perfmon } for pid=2786 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.044000 audit[2786]: AVC avc: denied { perfmon } for pid=2786 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.044000 audit[2786]: AVC avc: denied { perfmon } for pid=2786 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.044000 audit[2786]: AVC avc: denied { bpf } for pid=2786 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.044000 audit[2786]: AVC avc: denied { bpf } for pid=2786 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.044000 audit: BPF prog-id=93 op=LOAD May 17 00:50:30.044000 audit[2786]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc0db6fe8 a2=40 a3=ffffc0db7018 items=0 ppid=2684 pid=2786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.044000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:50:30.044000 audit: BPF prog-id=93 op=UNLOAD May 17 00:50:30.198129 systemd-networkd[1629]: cali071ec9989b6: Gained IPv6LL May 17 00:50:30.632725 systemd-networkd[1629]: vxlan.calico: Link UP May 17 00:50:30.632733 systemd-networkd[1629]: vxlan.calico: Gained carrier May 17 00:50:30.650000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.650000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.650000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.650000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.650000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.650000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.650000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.650000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.650000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.650000 audit: BPF prog-id=94 op=LOAD May 17 00:50:30.650000 audit[2814]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff49f4b28 a2=98 a3=fffff49f4b18 items=0 ppid=2684 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.650000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:50:30.650000 audit: BPF prog-id=94 op=UNLOAD May 17 00:50:30.651000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.651000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.651000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.651000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.651000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.651000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.651000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.651000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.651000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.651000 audit: BPF prog-id=95 op=LOAD May 17 00:50:30.651000 audit[2814]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff49f4808 a2=74 a3=95 items=0 ppid=2684 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.651000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:50:30.651000 audit: BPF prog-id=95 op=UNLOAD May 17 00:50:30.651000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.651000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.651000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.651000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.651000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.651000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.651000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.651000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.651000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.651000 audit: BPF prog-id=96 op=LOAD May 17 00:50:30.651000 audit[2814]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff49f4868 a2=94 a3=2 items=0 ppid=2684 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.651000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:50:30.651000 audit: BPF prog-id=96 op=UNLOAD May 17 00:50:30.651000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.651000 audit[2814]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffff49f4898 a2=28 a3=fffff49f49c8 items=0 ppid=2684 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.651000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:50:30.651000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.651000 audit[2814]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff49f48c8 a2=28 a3=fffff49f49f8 items=0 ppid=2684 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.651000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:50:30.651000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.651000 audit[2814]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff49f4778 a2=28 a3=fffff49f48a8 items=0 ppid=2684 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.651000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:50:30.651000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.651000 audit[2814]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffff49f48e8 a2=28 a3=fffff49f4a18 items=0 ppid=2684 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.651000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:50:30.651000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.651000 audit[2814]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffff49f48c8 a2=28 a3=fffff49f49f8 items=0 ppid=2684 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.651000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:50:30.651000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.651000 audit[2814]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffff49f48b8 a2=28 a3=fffff49f49e8 items=0 ppid=2684 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.651000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:50:30.651000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.651000 audit[2814]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffff49f48e8 a2=28 a3=fffff49f4a18 items=0 ppid=2684 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.651000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:50:30.651000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.651000 audit[2814]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff49f48c8 a2=28 a3=fffff49f49f8 items=0 ppid=2684 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.651000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:50:30.651000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.651000 audit[2814]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff49f48e8 a2=28 a3=fffff49f4a18 items=0 ppid=2684 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.651000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:50:30.651000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.651000 audit[2814]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff49f48b8 a2=28 a3=fffff49f49e8 items=0 ppid=2684 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.651000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:50:30.651000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.651000 audit[2814]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffff49f4938 a2=28 a3=fffff49f4a78 items=0 ppid=2684 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.651000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:50:30.651000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.651000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.651000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.651000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.651000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.651000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.651000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.651000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.651000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.651000 audit: BPF prog-id=97 op=LOAD May 17 00:50:30.651000 audit[2814]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffff49f4758 a2=40 a3=fffff49f4788 items=0 ppid=2684 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.651000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:50:30.651000 audit: BPF prog-id=97 op=UNLOAD May 17 00:50:30.655000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.655000 audit[2814]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=fffff49f4780 a2=50 a3=0 items=0 ppid=2684 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.655000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:50:30.655000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.655000 audit[2814]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=fffff49f4780 a2=50 a3=0 items=0 ppid=2684 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.655000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:50:30.655000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.655000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.655000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.655000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.655000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.655000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.655000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.655000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.655000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.655000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.655000 audit: BPF prog-id=98 op=LOAD May 17 00:50:30.655000 audit[2814]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffff49f3ee8 a2=94 a3=2 items=0 ppid=2684 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.655000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:50:30.655000 audit: BPF prog-id=98 op=UNLOAD May 17 00:50:30.655000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.655000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.655000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.655000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.655000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.655000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.655000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.655000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.655000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.655000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.655000 audit: BPF prog-id=99 op=LOAD May 17 00:50:30.655000 audit[2814]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffff49f4078 a2=94 a3=30 items=0 ppid=2684 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.655000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:50:30.664000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.664000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.664000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.664000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.664000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.664000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.664000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.664000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.664000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.664000 audit: BPF prog-id=100 op=LOAD May 17 00:50:30.664000 audit[2820]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe6ce7458 a2=98 a3=ffffe6ce7448 items=0 ppid=2684 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.664000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:50:30.664000 audit: BPF prog-id=100 op=UNLOAD May 17 00:50:30.664000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.664000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.664000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.664000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.664000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.664000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.664000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.664000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.664000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.664000 audit: BPF prog-id=101 op=LOAD May 17 00:50:30.664000 audit[2820]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffe6ce70e8 a2=74 a3=95 items=0 ppid=2684 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.664000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:50:30.664000 audit: BPF prog-id=101 op=UNLOAD May 17 00:50:30.664000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.664000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.664000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.664000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.664000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.664000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.664000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.664000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.664000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.664000 audit: BPF prog-id=102 op=LOAD May 17 00:50:30.664000 audit[2820]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffe6ce7148 a2=94 a3=2 items=0 ppid=2684 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.664000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:50:30.664000 audit: BPF prog-id=102 op=UNLOAD May 17 00:50:30.764000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.764000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.764000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.764000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.764000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.764000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.764000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.764000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.764000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.764000 audit: BPF prog-id=103 op=LOAD May 17 00:50:30.764000 audit[2820]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffe6ce7108 a2=40 a3=ffffe6ce7138 items=0 ppid=2684 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.764000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:50:30.765000 audit: BPF prog-id=103 op=UNLOAD May 17 00:50:30.765000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.765000 audit[2820]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffe6ce7220 a2=50 a3=0 items=0 ppid=2684 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.765000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:50:30.773000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.773000 audit[2820]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe6ce7178 a2=28 a3=ffffe6ce72a8 items=0 ppid=2684 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.773000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:50:30.773000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.773000 audit[2820]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe6ce71a8 a2=28 a3=ffffe6ce72d8 items=0 ppid=2684 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.773000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:50:30.773000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.773000 audit[2820]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe6ce7058 a2=28 a3=ffffe6ce7188 items=0 ppid=2684 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.773000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:50:30.773000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.773000 audit[2820]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe6ce71c8 a2=28 a3=ffffe6ce72f8 items=0 ppid=2684 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.773000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:50:30.773000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.773000 audit[2820]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe6ce71a8 a2=28 a3=ffffe6ce72d8 items=0 ppid=2684 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.773000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:50:30.773000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.773000 audit[2820]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe6ce7198 a2=28 a3=ffffe6ce72c8 items=0 ppid=2684 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.773000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:50:30.773000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.773000 audit[2820]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe6ce71c8 a2=28 a3=ffffe6ce72f8 items=0 ppid=2684 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.773000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:50:30.773000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.773000 audit[2820]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe6ce71a8 a2=28 a3=ffffe6ce72d8 items=0 ppid=2684 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.773000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:50:30.773000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.773000 audit[2820]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe6ce71c8 a2=28 a3=ffffe6ce72f8 items=0 ppid=2684 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.773000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:50:30.773000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.773000 audit[2820]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe6ce7198 a2=28 a3=ffffe6ce72c8 items=0 ppid=2684 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.773000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:50:30.773000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.773000 audit[2820]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe6ce7218 a2=28 a3=ffffe6ce7358 items=0 ppid=2684 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.773000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:50:30.774000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.774000 audit[2820]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffe6ce6f50 a2=50 a3=0 items=0 ppid=2684 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.774000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:50:30.774000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.774000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.774000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.774000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.774000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.774000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.774000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.774000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.774000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.774000 audit: BPF prog-id=104 op=LOAD May 17 00:50:30.774000 audit[2820]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffe6ce6f58 a2=94 a3=5 items=0 ppid=2684 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.774000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:50:30.774000 audit: BPF prog-id=104 op=UNLOAD May 17 00:50:30.774000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.774000 audit[2820]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffe6ce7060 a2=50 a3=0 items=0 ppid=2684 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.774000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:50:30.774000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.774000 audit[2820]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffe6ce71a8 a2=4 a3=3 items=0 ppid=2684 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.774000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:50:30.774000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.774000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.774000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.774000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.774000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.774000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.774000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.774000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.774000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.774000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.774000 audit[2820]: AVC avc: denied { confidentiality } for pid=2820 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:50:30.774000 audit[2820]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffe6ce7188 a2=94 a3=6 items=0 ppid=2684 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.774000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:50:30.774000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.774000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.774000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.774000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.774000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.774000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.774000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.774000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.774000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.774000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.774000 audit[2820]: AVC avc: denied { confidentiality } for pid=2820 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:50:30.774000 audit[2820]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffe6ce6958 a2=94 a3=83 items=0 ppid=2684 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.774000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:50:30.774000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.774000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.774000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.774000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.774000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.774000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.774000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.774000 audit[2820]: AVC avc: denied { perfmon } for pid=2820 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.774000 audit[2820]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffe6ce6958 a2=94 a3=83 items=0 ppid=2684 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.774000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:50:30.774000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.774000 audit[2820]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe6ce8398 a2=10 a3=ffffe6ce8488 items=0 ppid=2684 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.774000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:50:30.775000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.775000 audit[2820]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe6ce8258 a2=10 a3=ffffe6ce8348 items=0 ppid=2684 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.775000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:50:30.775000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.775000 audit[2820]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe6ce81c8 a2=10 a3=ffffe6ce8348 items=0 ppid=2684 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.775000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:50:30.775000 audit[2820]: AVC avc: denied { bpf } for pid=2820 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:30.775000 audit[2820]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe6ce81c8 a2=10 a3=ffffe6ce8348 items=0 ppid=2684 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.775000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:50:30.780000 audit: BPF prog-id=99 op=UNLOAD May 17 00:50:30.804525 kubelet[1921]: E0517 00:50:30.804464 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:50:30.948000 audit[2844]: NETFILTER_CFG table=mangle:68 family=2 entries=16 op=nft_register_chain pid=2844 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:50:30.948000 audit[2844]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffe1719c70 a2=0 a3=ffff92a48fa8 items=0 ppid=2684 pid=2844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.948000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:50:30.966000 audit[2843]: NETFILTER_CFG table=nat:69 family=2 entries=15 op=nft_register_chain pid=2843 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:50:30.966000 audit[2843]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffd50a17b0 a2=0 a3=ffff9a7f1fa8 items=0 ppid=2684 pid=2843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.966000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:50:30.977000 audit[2842]: NETFILTER_CFG table=raw:70 family=2 entries=21 op=nft_register_chain pid=2842 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:50:30.977000 audit[2842]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=ffffc57c26e0 a2=0 a3=ffffb2189fa8 items=0 ppid=2684 pid=2842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.977000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:50:30.983000 audit[2845]: NETFILTER_CFG table=filter:71 family=2 entries=73 op=nft_register_chain pid=2845 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:50:30.983000 audit[2845]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=38580 a0=3 a1=ffffc335e3e0 a2=0 a3=ffff94ce2fa8 items=0 ppid=2684 pid=2845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:30.983000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:50:31.805127 kubelet[1921]: E0517 00:50:31.805082 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:50:31.910965 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1578573578.mount: Deactivated successfully. May 17 00:50:32.502664 systemd-networkd[1629]: vxlan.calico: Gained IPv6LL May 17 00:50:32.806219 kubelet[1921]: E0517 00:50:32.806114 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:50:33.308714 env[1476]: time="2025-05-17T00:50:33.308655617Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:50:33.315461 env[1476]: time="2025-05-17T00:50:33.315427513Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e8b1cb61bd96acc3ff3c695318c9cc691213d532eee3731d038af92816fcb5f4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:50:33.321217 env[1476]: time="2025-05-17T00:50:33.321160554Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:50:33.325656 env[1476]: time="2025-05-17T00:50:33.325613915Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:50:33.326484 env[1476]: time="2025-05-17T00:50:33.326450183Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:e8b1cb61bd96acc3ff3c695318c9cc691213d532eee3731d038af92816fcb5f4\"" May 17 00:50:33.329486 env[1476]: time="2025-05-17T00:50:33.329442595Z" level=info msg="CreateContainer within sandbox \"c590ecee46221fde1c9129472202c6635a55b0c7fa668ad68b0e127a58a0f18c\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" May 17 00:50:33.369370 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount463783515.mount: Deactivated successfully. May 17 00:50:33.392446 env[1476]: time="2025-05-17T00:50:33.392395811Z" level=info msg="CreateContainer within sandbox \"c590ecee46221fde1c9129472202c6635a55b0c7fa668ad68b0e127a58a0f18c\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"164c8dddb456bc9962fc207306402da030595d5f5ada34cc27094ac17364e7c6\"" May 17 00:50:33.393200 env[1476]: time="2025-05-17T00:50:33.393158003Z" level=info msg="StartContainer for \"164c8dddb456bc9962fc207306402da030595d5f5ada34cc27094ac17364e7c6\"" May 17 00:50:33.411243 systemd[1]: Started cri-containerd-164c8dddb456bc9962fc207306402da030595d5f5ada34cc27094ac17364e7c6.scope. May 17 00:50:33.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:33.430828 kernel: kauditd_printk_skb: 611 callbacks suppressed May 17 00:50:33.430907 kernel: audit: type=1400 audit(1747443033.424:662): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:33.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:33.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:33.493246 kernel: audit: type=1400 audit(1747443033.424:663): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:33.493441 kernel: audit: type=1400 audit(1747443033.424:664): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:33.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:33.512953 kernel: audit: type=1400 audit(1747443033.424:665): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:33.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:33.532546 kernel: audit: type=1400 audit(1747443033.424:666): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:33.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:33.553455 kernel: audit: type=1400 audit(1747443033.424:667): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:33.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:33.572460 kernel: audit: type=1400 audit(1747443033.424:668): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:33.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:33.590925 kernel: audit: type=1400 audit(1747443033.424:669): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:33.591336 env[1476]: time="2025-05-17T00:50:33.591284431Z" level=info msg="StartContainer for \"164c8dddb456bc9962fc207306402da030595d5f5ada34cc27094ac17364e7c6\" returns successfully" May 17 00:50:33.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:33.609931 kernel: audit: type=1400 audit(1747443033.424:670): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:33.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:33.628418 kernel: audit: type=1400 audit(1747443033.424:671): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:33.424000 audit: BPF prog-id=105 op=LOAD May 17 00:50:33.449000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:33.449000 audit[2866]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2604 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:33.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136346338646464623435366263393936326663323037333036343032 May 17 00:50:33.449000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:33.449000 audit[2866]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2604 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:33.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136346338646464623435366263393936326663323037333036343032 May 17 00:50:33.449000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:33.449000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:33.449000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:33.449000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:33.449000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:33.449000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:33.449000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:33.449000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:33.449000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:33.449000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:33.449000 audit: BPF prog-id=106 op=LOAD May 17 00:50:33.449000 audit[2866]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2604 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:33.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136346338646464623435366263393936326663323037333036343032 May 17 00:50:33.449000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:33.449000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:33.449000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:33.449000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:33.449000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:33.449000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:33.449000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:33.449000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:33.449000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:33.449000 audit: BPF prog-id=107 op=LOAD May 17 00:50:33.449000 audit[2866]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2604 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:33.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136346338646464623435366263393936326663323037333036343032 May 17 00:50:33.449000 audit: BPF prog-id=107 op=UNLOAD May 17 00:50:33.449000 audit: BPF prog-id=106 op=UNLOAD May 17 00:50:33.449000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:33.449000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:33.449000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:33.449000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:33.449000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:33.449000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:33.449000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:33.449000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:33.449000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:33.449000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:33.449000 audit: BPF prog-id=108 op=LOAD May 17 00:50:33.449000 audit[2866]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2604 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:33.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136346338646464623435366263393936326663323037333036343032 May 17 00:50:33.806788 kubelet[1921]: E0517 00:50:33.806742 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:50:33.931592 kubelet[1921]: I0517 00:50:33.931529 1921 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-qktgp" podStartSLOduration=9.509903861 podStartE2EDuration="26.931509356s" podCreationTimestamp="2025-05-17 00:50:07 +0000 UTC" firstStartedPulling="2025-05-17 00:50:10.430230255 +0000 UTC m=+3.747106127" lastFinishedPulling="2025-05-17 00:50:27.85183579 +0000 UTC m=+21.168711622" observedRunningTime="2025-05-17 00:50:28.932798048 +0000 UTC m=+22.249673920" watchObservedRunningTime="2025-05-17 00:50:33.931509356 +0000 UTC m=+27.248385188" May 17 00:50:34.806918 kubelet[1921]: E0517 00:50:34.806858 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:50:35.807835 kubelet[1921]: E0517 00:50:35.807784 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:50:36.807938 kubelet[1921]: E0517 00:50:36.807898 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:50:36.869567 env[1476]: time="2025-05-17T00:50:36.869274608Z" level=info msg="StopPodSandbox for \"609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921\"" May 17 00:50:36.912075 kubelet[1921]: I0517 00:50:36.912017 1921 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-8587fbcb89-bdd7l" podStartSLOduration=4.590882146 podStartE2EDuration="8.911998221s" podCreationTimestamp="2025-05-17 00:50:28 +0000 UTC" firstStartedPulling="2025-05-17 00:50:29.006918488 +0000 UTC m=+22.323794360" lastFinishedPulling="2025-05-17 00:50:33.328034563 +0000 UTC m=+26.644910435" observedRunningTime="2025-05-17 00:50:33.932330425 +0000 UTC m=+27.249206297" watchObservedRunningTime="2025-05-17 00:50:36.911998221 +0000 UTC m=+30.228874093" May 17 00:50:36.945653 env[1476]: 2025-05-17 00:50:36.912 [INFO][2929] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921" May 17 00:50:36.945653 env[1476]: 2025-05-17 00:50:36.913 [INFO][2929] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921" iface="eth0" netns="/var/run/netns/cni-2213d78f-c1bd-eff5-d253-3b77fc3b8ddb" May 17 00:50:36.945653 env[1476]: 2025-05-17 00:50:36.914 [INFO][2929] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921" iface="eth0" netns="/var/run/netns/cni-2213d78f-c1bd-eff5-d253-3b77fc3b8ddb" May 17 00:50:36.945653 env[1476]: 2025-05-17 00:50:36.914 [INFO][2929] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921" iface="eth0" netns="/var/run/netns/cni-2213d78f-c1bd-eff5-d253-3b77fc3b8ddb" May 17 00:50:36.945653 env[1476]: 2025-05-17 00:50:36.914 [INFO][2929] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921" May 17 00:50:36.945653 env[1476]: 2025-05-17 00:50:36.914 [INFO][2929] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921" May 17 00:50:36.945653 env[1476]: 2025-05-17 00:50:36.931 [INFO][2937] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921" HandleID="k8s-pod-network.609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921" Workload="10.200.20.28-k8s-csi--node--driver--wfbrr-eth0" May 17 00:50:36.945653 env[1476]: 2025-05-17 00:50:36.932 [INFO][2937] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:50:36.945653 env[1476]: 2025-05-17 00:50:36.932 [INFO][2937] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:50:36.945653 env[1476]: 2025-05-17 00:50:36.941 [WARNING][2937] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921" HandleID="k8s-pod-network.609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921" Workload="10.200.20.28-k8s-csi--node--driver--wfbrr-eth0" May 17 00:50:36.945653 env[1476]: 2025-05-17 00:50:36.941 [INFO][2937] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921" HandleID="k8s-pod-network.609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921" Workload="10.200.20.28-k8s-csi--node--driver--wfbrr-eth0" May 17 00:50:36.945653 env[1476]: 2025-05-17 00:50:36.942 [INFO][2937] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:50:36.945653 env[1476]: 2025-05-17 00:50:36.944 [INFO][2929] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921" May 17 00:50:36.947277 systemd[1]: run-netns-cni\x2d2213d78f\x2dc1bd\x2deff5\x2dd253\x2d3b77fc3b8ddb.mount: Deactivated successfully. May 17 00:50:36.949338 env[1476]: time="2025-05-17T00:50:36.949303507Z" level=info msg="TearDown network for sandbox \"609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921\" successfully" May 17 00:50:36.949415 env[1476]: time="2025-05-17T00:50:36.949399181Z" level=info msg="StopPodSandbox for \"609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921\" returns successfully" May 17 00:50:36.950223 env[1476]: time="2025-05-17T00:50:36.950197615Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wfbrr,Uid:8a14b7c5-5085-44c4-a97d-df8fa59ba1ab,Namespace:calico-system,Attempt:1,}" May 17 00:50:37.100837 systemd-networkd[1629]: cali868025527bb: Link UP May 17 00:50:37.114246 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:50:37.114338 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali868025527bb: link becomes ready May 17 00:50:37.115269 systemd-networkd[1629]: cali868025527bb: Gained carrier May 17 00:50:37.130076 env[1476]: 2025-05-17 00:50:37.037 [INFO][2943] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.28-k8s-csi--node--driver--wfbrr-eth0 csi-node-driver- calico-system 8a14b7c5-5085-44c4-a97d-df8fa59ba1ab 1466 0 2025-05-17 00:50:08 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:68bf44dd5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.200.20.28 csi-node-driver-wfbrr eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali868025527bb [] [] }} ContainerID="c69ace882f2ae10655648b9ffb5aa5432b0715c20a8b6e85449d8c47c66ba45f" Namespace="calico-system" Pod="csi-node-driver-wfbrr" WorkloadEndpoint="10.200.20.28-k8s-csi--node--driver--wfbrr-" May 17 00:50:37.130076 env[1476]: 2025-05-17 00:50:37.037 [INFO][2943] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="c69ace882f2ae10655648b9ffb5aa5432b0715c20a8b6e85449d8c47c66ba45f" Namespace="calico-system" Pod="csi-node-driver-wfbrr" WorkloadEndpoint="10.200.20.28-k8s-csi--node--driver--wfbrr-eth0" May 17 00:50:37.130076 env[1476]: 2025-05-17 00:50:37.057 [INFO][2957] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c69ace882f2ae10655648b9ffb5aa5432b0715c20a8b6e85449d8c47c66ba45f" HandleID="k8s-pod-network.c69ace882f2ae10655648b9ffb5aa5432b0715c20a8b6e85449d8c47c66ba45f" Workload="10.200.20.28-k8s-csi--node--driver--wfbrr-eth0" May 17 00:50:37.130076 env[1476]: 2025-05-17 00:50:37.058 [INFO][2957] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c69ace882f2ae10655648b9ffb5aa5432b0715c20a8b6e85449d8c47c66ba45f" HandleID="k8s-pod-network.c69ace882f2ae10655648b9ffb5aa5432b0715c20a8b6e85449d8c47c66ba45f" Workload="10.200.20.28-k8s-csi--node--driver--wfbrr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002cf750), Attrs:map[string]string{"namespace":"calico-system", "node":"10.200.20.28", "pod":"csi-node-driver-wfbrr", "timestamp":"2025-05-17 00:50:37.057825007 +0000 UTC"}, Hostname:"10.200.20.28", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:50:37.130076 env[1476]: 2025-05-17 00:50:37.058 [INFO][2957] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:50:37.130076 env[1476]: 2025-05-17 00:50:37.058 [INFO][2957] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:50:37.130076 env[1476]: 2025-05-17 00:50:37.058 [INFO][2957] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.28' May 17 00:50:37.130076 env[1476]: 2025-05-17 00:50:37.067 [INFO][2957] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.c69ace882f2ae10655648b9ffb5aa5432b0715c20a8b6e85449d8c47c66ba45f" host="10.200.20.28" May 17 00:50:37.130076 env[1476]: 2025-05-17 00:50:37.071 [INFO][2957] ipam/ipam.go 394: Looking up existing affinities for host host="10.200.20.28" May 17 00:50:37.130076 env[1476]: 2025-05-17 00:50:37.075 [INFO][2957] ipam/ipam.go 511: Trying affinity for 192.168.124.0/26 host="10.200.20.28" May 17 00:50:37.130076 env[1476]: 2025-05-17 00:50:37.076 [INFO][2957] ipam/ipam.go 158: Attempting to load block cidr=192.168.124.0/26 host="10.200.20.28" May 17 00:50:37.130076 env[1476]: 2025-05-17 00:50:37.078 [INFO][2957] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.124.0/26 host="10.200.20.28" May 17 00:50:37.130076 env[1476]: 2025-05-17 00:50:37.078 [INFO][2957] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.124.0/26 handle="k8s-pod-network.c69ace882f2ae10655648b9ffb5aa5432b0715c20a8b6e85449d8c47c66ba45f" host="10.200.20.28" May 17 00:50:37.130076 env[1476]: 2025-05-17 00:50:37.080 [INFO][2957] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.c69ace882f2ae10655648b9ffb5aa5432b0715c20a8b6e85449d8c47c66ba45f May 17 00:50:37.130076 env[1476]: 2025-05-17 00:50:37.086 [INFO][2957] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.124.0/26 handle="k8s-pod-network.c69ace882f2ae10655648b9ffb5aa5432b0715c20a8b6e85449d8c47c66ba45f" host="10.200.20.28" May 17 00:50:37.130076 env[1476]: 2025-05-17 00:50:37.095 [INFO][2957] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.124.2/26] block=192.168.124.0/26 handle="k8s-pod-network.c69ace882f2ae10655648b9ffb5aa5432b0715c20a8b6e85449d8c47c66ba45f" host="10.200.20.28" May 17 00:50:37.130076 env[1476]: 2025-05-17 00:50:37.095 [INFO][2957] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.124.2/26] handle="k8s-pod-network.c69ace882f2ae10655648b9ffb5aa5432b0715c20a8b6e85449d8c47c66ba45f" host="10.200.20.28" May 17 00:50:37.130076 env[1476]: 2025-05-17 00:50:37.095 [INFO][2957] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:50:37.130076 env[1476]: 2025-05-17 00:50:37.095 [INFO][2957] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.124.2/26] IPv6=[] ContainerID="c69ace882f2ae10655648b9ffb5aa5432b0715c20a8b6e85449d8c47c66ba45f" HandleID="k8s-pod-network.c69ace882f2ae10655648b9ffb5aa5432b0715c20a8b6e85449d8c47c66ba45f" Workload="10.200.20.28-k8s-csi--node--driver--wfbrr-eth0" May 17 00:50:37.130621 env[1476]: 2025-05-17 00:50:37.097 [INFO][2943] cni-plugin/k8s.go 418: Populated endpoint ContainerID="c69ace882f2ae10655648b9ffb5aa5432b0715c20a8b6e85449d8c47c66ba45f" Namespace="calico-system" Pod="csi-node-driver-wfbrr" WorkloadEndpoint="10.200.20.28-k8s-csi--node--driver--wfbrr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.28-k8s-csi--node--driver--wfbrr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"8a14b7c5-5085-44c4-a97d-df8fa59ba1ab", ResourceVersion:"1466", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 50, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"68bf44dd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.28", ContainerID:"", Pod:"csi-node-driver-wfbrr", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.124.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali868025527bb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:50:37.130621 env[1476]: 2025-05-17 00:50:37.097 [INFO][2943] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.124.2/32] ContainerID="c69ace882f2ae10655648b9ffb5aa5432b0715c20a8b6e85449d8c47c66ba45f" Namespace="calico-system" Pod="csi-node-driver-wfbrr" WorkloadEndpoint="10.200.20.28-k8s-csi--node--driver--wfbrr-eth0" May 17 00:50:37.130621 env[1476]: 2025-05-17 00:50:37.097 [INFO][2943] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali868025527bb ContainerID="c69ace882f2ae10655648b9ffb5aa5432b0715c20a8b6e85449d8c47c66ba45f" Namespace="calico-system" Pod="csi-node-driver-wfbrr" WorkloadEndpoint="10.200.20.28-k8s-csi--node--driver--wfbrr-eth0" May 17 00:50:37.130621 env[1476]: 2025-05-17 00:50:37.116 [INFO][2943] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c69ace882f2ae10655648b9ffb5aa5432b0715c20a8b6e85449d8c47c66ba45f" Namespace="calico-system" Pod="csi-node-driver-wfbrr" WorkloadEndpoint="10.200.20.28-k8s-csi--node--driver--wfbrr-eth0" May 17 00:50:37.130621 env[1476]: 2025-05-17 00:50:37.116 [INFO][2943] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="c69ace882f2ae10655648b9ffb5aa5432b0715c20a8b6e85449d8c47c66ba45f" Namespace="calico-system" Pod="csi-node-driver-wfbrr" WorkloadEndpoint="10.200.20.28-k8s-csi--node--driver--wfbrr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.28-k8s-csi--node--driver--wfbrr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"8a14b7c5-5085-44c4-a97d-df8fa59ba1ab", ResourceVersion:"1466", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 50, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"68bf44dd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.28", ContainerID:"c69ace882f2ae10655648b9ffb5aa5432b0715c20a8b6e85449d8c47c66ba45f", Pod:"csi-node-driver-wfbrr", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.124.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali868025527bb", MAC:"da:bf:9d:eb:9b:32", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:50:37.130621 env[1476]: 2025-05-17 00:50:37.128 [INFO][2943] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="c69ace882f2ae10655648b9ffb5aa5432b0715c20a8b6e85449d8c47c66ba45f" Namespace="calico-system" Pod="csi-node-driver-wfbrr" WorkloadEndpoint="10.200.20.28-k8s-csi--node--driver--wfbrr-eth0" May 17 00:50:37.139000 audit[2972]: NETFILTER_CFG table=filter:72 family=2 entries=42 op=nft_register_chain pid=2972 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:50:37.139000 audit[2972]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22552 a0=3 a1=ffffdb17c840 a2=0 a3=ffff91fc6fa8 items=0 ppid=2684 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:37.139000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:50:37.145121 env[1476]: time="2025-05-17T00:50:37.144901712Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:50:37.145121 env[1476]: time="2025-05-17T00:50:37.144935950Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:50:37.145121 env[1476]: time="2025-05-17T00:50:37.144945710Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:50:37.145286 env[1476]: time="2025-05-17T00:50:37.145159258Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c69ace882f2ae10655648b9ffb5aa5432b0715c20a8b6e85449d8c47c66ba45f pid=2981 runtime=io.containerd.runc.v2 May 17 00:50:37.161430 systemd[1]: Started cri-containerd-c69ace882f2ae10655648b9ffb5aa5432b0715c20a8b6e85449d8c47c66ba45f.scope. May 17 00:50:37.169000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:37.169000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:37.169000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:37.169000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:37.169000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:37.169000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:37.169000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:37.169000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:37.169000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:37.169000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:37.169000 audit: BPF prog-id=109 op=LOAD May 17 00:50:37.170000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:37.170000 audit[2990]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2981 pid=2990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:37.170000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336396163653838326632616531303635353634386239666662356161 May 17 00:50:37.171000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:37.171000 audit[2990]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2981 pid=2990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:37.171000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336396163653838326632616531303635353634386239666662356161 May 17 00:50:37.171000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:37.171000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:37.171000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:37.171000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:37.171000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:37.171000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:37.171000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:37.171000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:37.171000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:37.171000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:37.171000 audit: BPF prog-id=110 op=LOAD May 17 00:50:37.171000 audit[2990]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2981 pid=2990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:37.171000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336396163653838326632616531303635353634386239666662356161 May 17 00:50:37.172000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:37.172000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:37.172000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:37.172000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:37.172000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:37.172000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:37.172000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:37.172000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:37.172000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:37.172000 audit: BPF prog-id=111 op=LOAD May 17 00:50:37.172000 audit[2990]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2981 pid=2990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:37.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336396163653838326632616531303635353634386239666662356161 May 17 00:50:37.172000 audit: BPF prog-id=111 op=UNLOAD May 17 00:50:37.172000 audit: BPF prog-id=110 op=UNLOAD May 17 00:50:37.172000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:37.172000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:37.172000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:37.172000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:37.172000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:37.172000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:37.172000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:37.172000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:37.172000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:37.172000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:37.172000 audit: BPF prog-id=112 op=LOAD May 17 00:50:37.172000 audit[2990]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2981 pid=2990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:37.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336396163653838326632616531303635353634386239666662356161 May 17 00:50:37.185099 env[1476]: time="2025-05-17T00:50:37.185052735Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wfbrr,Uid:8a14b7c5-5085-44c4-a97d-df8fa59ba1ab,Namespace:calico-system,Attempt:1,} returns sandbox id \"c69ace882f2ae10655648b9ffb5aa5432b0715c20a8b6e85449d8c47c66ba45f\"" May 17 00:50:37.187059 env[1476]: time="2025-05-17T00:50:37.186960668Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\"" May 17 00:50:37.808190 kubelet[1921]: E0517 00:50:37.808140 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:50:38.512178 env[1476]: time="2025-05-17T00:50:38.512130613Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:50:38.519529 env[1476]: time="2025-05-17T00:50:38.519494170Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ebe7e098653491dec9f15f87d7f5d33f47b09d1d6f3ef83deeaaa6237024c045,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:50:38.525472 env[1476]: time="2025-05-17T00:50:38.525443924Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:50:38.529490 env[1476]: time="2025-05-17T00:50:38.529461904Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:27883a4104876fe239311dd93ce6efd0c4a87de7163d57a4c8d96bd65a287ffd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:50:38.529967 env[1476]: time="2025-05-17T00:50:38.529936438Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\" returns image reference \"sha256:ebe7e098653491dec9f15f87d7f5d33f47b09d1d6f3ef83deeaaa6237024c045\"" May 17 00:50:38.532362 env[1476]: time="2025-05-17T00:50:38.532335027Z" level=info msg="CreateContainer within sandbox \"c69ace882f2ae10655648b9ffb5aa5432b0715c20a8b6e85449d8c47c66ba45f\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 17 00:50:38.576041 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1436021901.mount: Deactivated successfully. May 17 00:50:38.602771 env[1476]: time="2025-05-17T00:50:38.602721815Z" level=info msg="CreateContainer within sandbox \"c69ace882f2ae10655648b9ffb5aa5432b0715c20a8b6e85449d8c47c66ba45f\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"6761a63820b9f02fbda2c31d40bf423bd7265482cb9494ee482058bccb9043b0\"" May 17 00:50:38.603345 env[1476]: time="2025-05-17T00:50:38.603267905Z" level=info msg="StartContainer for \"6761a63820b9f02fbda2c31d40bf423bd7265482cb9494ee482058bccb9043b0\"" May 17 00:50:38.624903 systemd[1]: Started cri-containerd-6761a63820b9f02fbda2c31d40bf423bd7265482cb9494ee482058bccb9043b0.scope. May 17 00:50:38.639000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:38.645439 kernel: kauditd_printk_skb: 107 callbacks suppressed May 17 00:50:38.645502 kernel: audit: type=1400 audit(1747443038.639:699): avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:38.664032 kernel: audit: type=1300 audit(1747443038.639:699): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2981 pid=3023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:38.639000 audit[3023]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2981 pid=3023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:38.639000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637363161363338323062396630326662646132633331643430626634 May 17 00:50:38.717883 kernel: audit: type=1327 audit(1747443038.639:699): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637363161363338323062396630326662646132633331643430626634 May 17 00:50:38.639000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:38.737190 kernel: audit: type=1400 audit(1747443038.639:700): avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:38.639000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:38.755638 kernel: audit: type=1400 audit(1747443038.639:700): avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:38.639000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:38.773300 kernel: audit: type=1400 audit(1747443038.639:700): avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:38.639000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:38.792104 kernel: audit: type=1400 audit(1747443038.639:700): avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:38.792332 kernel: audit: type=1400 audit(1747443038.639:700): avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:38.639000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:38.639000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:38.810317 kubelet[1921]: E0517 00:50:38.810277 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:50:38.810763 env[1476]: time="2025-05-17T00:50:38.810725751Z" level=info msg="StartContainer for \"6761a63820b9f02fbda2c31d40bf423bd7265482cb9494ee482058bccb9043b0\" returns successfully" May 17 00:50:38.828377 kernel: audit: type=1400 audit(1747443038.639:700): avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:38.829112 kernel: audit: type=1400 audit(1747443038.639:700): avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:38.639000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:38.829873 env[1476]: time="2025-05-17T00:50:38.829842225Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\"" May 17 00:50:38.639000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:38.639000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:38.639000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:38.639000 audit: BPF prog-id=113 op=LOAD May 17 00:50:38.639000 audit[3023]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2981 pid=3023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:38.639000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637363161363338323062396630326662646132633331643430626634 May 17 00:50:38.639000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:38.639000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:38.639000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:38.639000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:38.639000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:38.639000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:38.639000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:38.639000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:38.639000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:38.639000 audit: BPF prog-id=114 op=LOAD May 17 00:50:38.639000 audit[3023]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2981 pid=3023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:38.639000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637363161363338323062396630326662646132633331643430626634 May 17 00:50:38.639000 audit: BPF prog-id=114 op=UNLOAD May 17 00:50:38.639000 audit: BPF prog-id=113 op=UNLOAD May 17 00:50:38.639000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:38.639000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:38.639000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:38.639000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:38.639000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:38.639000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:38.639000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:38.639000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:38.639000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:38.639000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:38.639000 audit: BPF prog-id=115 op=LOAD May 17 00:50:38.639000 audit[3023]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2981 pid=3023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:38.639000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637363161363338323062396630326662646132633331643430626634 May 17 00:50:38.947419 systemd[1]: run-containerd-runc-k8s.io-6761a63820b9f02fbda2c31d40bf423bd7265482cb9494ee482058bccb9043b0-runc.Q4Xmhq.mount: Deactivated successfully. May 17 00:50:39.094177 systemd-networkd[1629]: cali868025527bb: Gained IPv6LL May 17 00:50:39.432908 systemd[1]: run-containerd-runc-k8s.io-3bf8248740ac8850ca1033bbdd9f472dcaa5a638aa4a2e391e4cd84d6700c665-runc.uXSDxZ.mount: Deactivated successfully. May 17 00:50:39.439000 audit[3062]: NETFILTER_CFG table=filter:73 family=2 entries=24 op=nft_register_rule pid=3062 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:50:39.439000 audit[3062]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13432 a0=3 a1=fffff45038d0 a2=0 a3=1 items=0 ppid=2105 pid=3062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:39.439000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:50:39.445000 audit[3062]: NETFILTER_CFG table=nat:74 family=2 entries=22 op=nft_register_rule pid=3062 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:50:39.445000 audit[3062]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=fffff45038d0 a2=0 a3=1 items=0 ppid=2105 pid=3062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:39.445000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:50:39.459000 audit[3075]: NETFILTER_CFG table=filter:75 family=2 entries=36 op=nft_register_rule pid=3075 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:50:39.459000 audit[3075]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13432 a0=3 a1=fffff96cd730 a2=0 a3=1 items=0 ppid=2105 pid=3075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:39.459000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:50:39.463000 audit[3075]: NETFILTER_CFG table=nat:76 family=2 entries=22 op=nft_register_rule pid=3075 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:50:39.463000 audit[3075]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=fffff96cd730 a2=0 a3=1 items=0 ppid=2105 pid=3075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:39.463000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:50:39.494373 systemd[1]: Created slice kubepods-besteffort-pod83882207_24d0_4c2b_8a38_9e70fb65595a.slice. May 17 00:50:39.598827 kubelet[1921]: I0517 00:50:39.598124 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5nj4d\" (UniqueName: \"kubernetes.io/projected/83882207-24d0-4c2b-8a38-9e70fb65595a-kube-api-access-5nj4d\") pod \"nfs-server-provisioner-0\" (UID: \"83882207-24d0-4c2b-8a38-9e70fb65595a\") " pod="default/nfs-server-provisioner-0" May 17 00:50:39.598827 kubelet[1921]: I0517 00:50:39.598178 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/83882207-24d0-4c2b-8a38-9e70fb65595a-data\") pod \"nfs-server-provisioner-0\" (UID: \"83882207-24d0-4c2b-8a38-9e70fb65595a\") " pod="default/nfs-server-provisioner-0" May 17 00:50:39.798365 env[1476]: time="2025-05-17T00:50:39.798242451Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:83882207-24d0-4c2b-8a38-9e70fb65595a,Namespace:default,Attempt:0,}" May 17 00:50:39.811230 kubelet[1921]: E0517 00:50:39.811179 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:50:40.000142 systemd-networkd[1629]: cali60e51b789ff: Link UP May 17 00:50:40.014120 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:50:40.014232 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready May 17 00:50:40.015012 systemd-networkd[1629]: cali60e51b789ff: Gained carrier May 17 00:50:40.029765 env[1476]: 2025-05-17 00:50:39.921 [INFO][3079] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.28-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 83882207-24d0-4c2b-8a38-9e70fb65595a 1499 0 2025-05-17 00:50:39 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.200.20.28 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="ae242e38f6dfdcbf3a55b5796c232e063ae09b071b22262cbdebd18e2447af73" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.28-k8s-nfs--server--provisioner--0-" May 17 00:50:40.029765 env[1476]: 2025-05-17 00:50:39.921 [INFO][3079] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="ae242e38f6dfdcbf3a55b5796c232e063ae09b071b22262cbdebd18e2447af73" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.28-k8s-nfs--server--provisioner--0-eth0" May 17 00:50:40.029765 env[1476]: 2025-05-17 00:50:39.945 [INFO][3092] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ae242e38f6dfdcbf3a55b5796c232e063ae09b071b22262cbdebd18e2447af73" HandleID="k8s-pod-network.ae242e38f6dfdcbf3a55b5796c232e063ae09b071b22262cbdebd18e2447af73" Workload="10.200.20.28-k8s-nfs--server--provisioner--0-eth0" May 17 00:50:40.029765 env[1476]: 2025-05-17 00:50:39.945 [INFO][3092] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="ae242e38f6dfdcbf3a55b5796c232e063ae09b071b22262cbdebd18e2447af73" HandleID="k8s-pod-network.ae242e38f6dfdcbf3a55b5796c232e063ae09b071b22262cbdebd18e2447af73" Workload="10.200.20.28-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002d7020), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.28", "pod":"nfs-server-provisioner-0", "timestamp":"2025-05-17 00:50:39.945289295 +0000 UTC"}, Hostname:"10.200.20.28", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:50:40.029765 env[1476]: 2025-05-17 00:50:39.945 [INFO][3092] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:50:40.029765 env[1476]: 2025-05-17 00:50:39.945 [INFO][3092] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:50:40.029765 env[1476]: 2025-05-17 00:50:39.945 [INFO][3092] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.28' May 17 00:50:40.029765 env[1476]: 2025-05-17 00:50:39.958 [INFO][3092] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.ae242e38f6dfdcbf3a55b5796c232e063ae09b071b22262cbdebd18e2447af73" host="10.200.20.28" May 17 00:50:40.029765 env[1476]: 2025-05-17 00:50:39.962 [INFO][3092] ipam/ipam.go 394: Looking up existing affinities for host host="10.200.20.28" May 17 00:50:40.029765 env[1476]: 2025-05-17 00:50:39.967 [INFO][3092] ipam/ipam.go 511: Trying affinity for 192.168.124.0/26 host="10.200.20.28" May 17 00:50:40.029765 env[1476]: 2025-05-17 00:50:39.968 [INFO][3092] ipam/ipam.go 158: Attempting to load block cidr=192.168.124.0/26 host="10.200.20.28" May 17 00:50:40.029765 env[1476]: 2025-05-17 00:50:39.970 [INFO][3092] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.124.0/26 host="10.200.20.28" May 17 00:50:40.029765 env[1476]: 2025-05-17 00:50:39.970 [INFO][3092] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.124.0/26 handle="k8s-pod-network.ae242e38f6dfdcbf3a55b5796c232e063ae09b071b22262cbdebd18e2447af73" host="10.200.20.28" May 17 00:50:40.029765 env[1476]: 2025-05-17 00:50:39.972 [INFO][3092] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.ae242e38f6dfdcbf3a55b5796c232e063ae09b071b22262cbdebd18e2447af73 May 17 00:50:40.029765 env[1476]: 2025-05-17 00:50:39.977 [INFO][3092] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.124.0/26 handle="k8s-pod-network.ae242e38f6dfdcbf3a55b5796c232e063ae09b071b22262cbdebd18e2447af73" host="10.200.20.28" May 17 00:50:40.029765 env[1476]: 2025-05-17 00:50:39.988 [INFO][3092] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.124.3/26] block=192.168.124.0/26 handle="k8s-pod-network.ae242e38f6dfdcbf3a55b5796c232e063ae09b071b22262cbdebd18e2447af73" host="10.200.20.28" May 17 00:50:40.029765 env[1476]: 2025-05-17 00:50:39.988 [INFO][3092] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.124.3/26] handle="k8s-pod-network.ae242e38f6dfdcbf3a55b5796c232e063ae09b071b22262cbdebd18e2447af73" host="10.200.20.28" May 17 00:50:40.029765 env[1476]: 2025-05-17 00:50:39.988 [INFO][3092] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:50:40.029765 env[1476]: 2025-05-17 00:50:39.988 [INFO][3092] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.124.3/26] IPv6=[] ContainerID="ae242e38f6dfdcbf3a55b5796c232e063ae09b071b22262cbdebd18e2447af73" HandleID="k8s-pod-network.ae242e38f6dfdcbf3a55b5796c232e063ae09b071b22262cbdebd18e2447af73" Workload="10.200.20.28-k8s-nfs--server--provisioner--0-eth0" May 17 00:50:40.030341 env[1476]: 2025-05-17 00:50:39.990 [INFO][3079] cni-plugin/k8s.go 418: Populated endpoint ContainerID="ae242e38f6dfdcbf3a55b5796c232e063ae09b071b22262cbdebd18e2447af73" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.28-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.28-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"83882207-24d0-4c2b-8a38-9e70fb65595a", ResourceVersion:"1499", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 50, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.28", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.124.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:50:40.030341 env[1476]: 2025-05-17 00:50:39.990 [INFO][3079] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.124.3/32] ContainerID="ae242e38f6dfdcbf3a55b5796c232e063ae09b071b22262cbdebd18e2447af73" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.28-k8s-nfs--server--provisioner--0-eth0" May 17 00:50:40.030341 env[1476]: 2025-05-17 00:50:39.990 [INFO][3079] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="ae242e38f6dfdcbf3a55b5796c232e063ae09b071b22262cbdebd18e2447af73" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.28-k8s-nfs--server--provisioner--0-eth0" May 17 00:50:40.030341 env[1476]: 2025-05-17 00:50:40.016 [INFO][3079] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ae242e38f6dfdcbf3a55b5796c232e063ae09b071b22262cbdebd18e2447af73" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.28-k8s-nfs--server--provisioner--0-eth0" May 17 00:50:40.030568 env[1476]: 2025-05-17 00:50:40.016 [INFO][3079] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="ae242e38f6dfdcbf3a55b5796c232e063ae09b071b22262cbdebd18e2447af73" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.28-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.28-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"83882207-24d0-4c2b-8a38-9e70fb65595a", ResourceVersion:"1499", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 50, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.28", ContainerID:"ae242e38f6dfdcbf3a55b5796c232e063ae09b071b22262cbdebd18e2447af73", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.124.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"d6:75:47:24:9d:e8", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:50:40.030568 env[1476]: 2025-05-17 00:50:40.025 [INFO][3079] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="ae242e38f6dfdcbf3a55b5796c232e063ae09b071b22262cbdebd18e2447af73" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.28-k8s-nfs--server--provisioner--0-eth0" May 17 00:50:40.037000 audit[3107]: NETFILTER_CFG table=filter:77 family=2 entries=40 op=nft_register_chain pid=3107 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:50:40.037000 audit[3107]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20756 a0=3 a1=ffffe2ff35b0 a2=0 a3=ffffb9c74fa8 items=0 ppid=2684 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:40.037000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:50:40.074769 env[1476]: time="2025-05-17T00:50:40.065711881Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:50:40.074769 env[1476]: time="2025-05-17T00:50:40.065745720Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:50:40.074769 env[1476]: time="2025-05-17T00:50:40.065769838Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:50:40.074769 env[1476]: time="2025-05-17T00:50:40.065879033Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ae242e38f6dfdcbf3a55b5796c232e063ae09b071b22262cbdebd18e2447af73 pid=3115 runtime=io.containerd.runc.v2 May 17 00:50:40.098184 systemd[1]: Started cri-containerd-ae242e38f6dfdcbf3a55b5796c232e063ae09b071b22262cbdebd18e2447af73.scope. May 17 00:50:40.102184 systemd[1]: run-containerd-runc-k8s.io-ae242e38f6dfdcbf3a55b5796c232e063ae09b071b22262cbdebd18e2447af73-runc.rQZ9jC.mount: Deactivated successfully. May 17 00:50:40.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.120000 audit: BPF prog-id=116 op=LOAD May 17 00:50:40.121000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.121000 audit[3125]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3115 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:40.121000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165323432653338663664666463626633613535623537393663323332 May 17 00:50:40.121000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.121000 audit[3125]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3115 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:40.121000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165323432653338663664666463626633613535623537393663323332 May 17 00:50:40.121000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.121000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.121000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.121000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.121000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.121000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.121000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.121000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.121000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.121000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.121000 audit: BPF prog-id=117 op=LOAD May 17 00:50:40.121000 audit[3125]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3115 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:40.121000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165323432653338663664666463626633613535623537393663323332 May 17 00:50:40.121000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.121000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.121000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.121000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.121000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.121000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.121000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.121000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.121000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.121000 audit: BPF prog-id=118 op=LOAD May 17 00:50:40.121000 audit[3125]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3115 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:40.121000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165323432653338663664666463626633613535623537393663323332 May 17 00:50:40.121000 audit: BPF prog-id=118 op=UNLOAD May 17 00:50:40.121000 audit: BPF prog-id=117 op=UNLOAD May 17 00:50:40.121000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.121000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.121000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.121000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.121000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.121000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.121000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.121000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.121000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.121000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.121000 audit: BPF prog-id=119 op=LOAD May 17 00:50:40.121000 audit[3125]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3115 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:40.121000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165323432653338663664666463626633613535623537393663323332 May 17 00:50:40.140864 env[1476]: time="2025-05-17T00:50:40.140818064Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:83882207-24d0-4c2b-8a38-9e70fb65595a,Namespace:default,Attempt:0,} returns sandbox id \"ae242e38f6dfdcbf3a55b5796c232e063ae09b071b22262cbdebd18e2447af73\"" May 17 00:50:40.336377 env[1476]: time="2025-05-17T00:50:40.335275532Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:50:40.345220 env[1476]: time="2025-05-17T00:50:40.345177618Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a5d5f2a68204ed0dbc50f8778616ee92a63c0e342d178a4620e6271484e5c8b2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:50:40.351255 env[1476]: time="2025-05-17T00:50:40.351224104Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:50:40.359571 env[1476]: time="2025-05-17T00:50:40.359519194Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:dca5c16181edde2e860463615523ce457cd9dcfca85b7cfdcd6f3ea7de6f2ac8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:50:40.362335 env[1476]: time="2025-05-17T00:50:40.362289170Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\" returns image reference \"sha256:a5d5f2a68204ed0dbc50f8778616ee92a63c0e342d178a4620e6271484e5c8b2\"" May 17 00:50:40.364283 env[1476]: time="2025-05-17T00:50:40.364257668Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" May 17 00:50:40.365673 env[1476]: time="2025-05-17T00:50:40.365645956Z" level=info msg="CreateContainer within sandbox \"c69ace882f2ae10655648b9ffb5aa5432b0715c20a8b6e85449d8c47c66ba45f\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 17 00:50:40.424484 env[1476]: time="2025-05-17T00:50:40.424442065Z" level=info msg="CreateContainer within sandbox \"c69ace882f2ae10655648b9ffb5aa5432b0715c20a8b6e85449d8c47c66ba45f\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"29327e2c93e21e203865a7b8416f9330080e80ea38f8a6131f966e9981605bd7\"" May 17 00:50:40.425368 env[1476]: time="2025-05-17T00:50:40.425309300Z" level=info msg="StartContainer for \"29327e2c93e21e203865a7b8416f9330080e80ea38f8a6131f966e9981605bd7\"" May 17 00:50:40.440463 systemd[1]: Started cri-containerd-29327e2c93e21e203865a7b8416f9330080e80ea38f8a6131f966e9981605bd7.scope. May 17 00:50:40.453000 audit[3159]: AVC avc: denied { perfmon } for pid=3159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.453000 audit[3159]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2981 pid=3159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:40.453000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239333237653263393365323165323033383635613762383431366639 May 17 00:50:40.453000 audit[3159]: AVC avc: denied { bpf } for pid=3159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.453000 audit[3159]: AVC avc: denied { bpf } for pid=3159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.453000 audit[3159]: AVC avc: denied { bpf } for pid=3159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.453000 audit[3159]: AVC avc: denied { perfmon } for pid=3159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.453000 audit[3159]: AVC avc: denied { perfmon } for pid=3159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.453000 audit[3159]: AVC avc: denied { perfmon } for pid=3159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.453000 audit[3159]: AVC avc: denied { perfmon } for pid=3159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.453000 audit[3159]: AVC avc: denied { perfmon } for pid=3159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.453000 audit[3159]: AVC avc: denied { bpf } for pid=3159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.453000 audit[3159]: AVC avc: denied { bpf } for pid=3159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.453000 audit: BPF prog-id=120 op=LOAD May 17 00:50:40.453000 audit[3159]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2981 pid=3159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:40.453000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239333237653263393365323165323033383635613762383431366639 May 17 00:50:40.453000 audit[3159]: AVC avc: denied { bpf } for pid=3159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.453000 audit[3159]: AVC avc: denied { bpf } for pid=3159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.453000 audit[3159]: AVC avc: denied { perfmon } for pid=3159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.453000 audit[3159]: AVC avc: denied { perfmon } for pid=3159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.453000 audit[3159]: AVC avc: denied { perfmon } for pid=3159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.453000 audit[3159]: AVC avc: denied { perfmon } for pid=3159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.453000 audit[3159]: AVC avc: denied { perfmon } for pid=3159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.453000 audit[3159]: AVC avc: denied { bpf } for pid=3159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.453000 audit[3159]: AVC avc: denied { bpf } for pid=3159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.453000 audit: BPF prog-id=121 op=LOAD May 17 00:50:40.453000 audit[3159]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2981 pid=3159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:40.453000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239333237653263393365323165323033383635613762383431366639 May 17 00:50:40.453000 audit: BPF prog-id=121 op=UNLOAD May 17 00:50:40.453000 audit: BPF prog-id=120 op=UNLOAD May 17 00:50:40.453000 audit[3159]: AVC avc: denied { bpf } for pid=3159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.453000 audit[3159]: AVC avc: denied { bpf } for pid=3159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.453000 audit[3159]: AVC avc: denied { bpf } for pid=3159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.453000 audit[3159]: AVC avc: denied { perfmon } for pid=3159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.453000 audit[3159]: AVC avc: denied { perfmon } for pid=3159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.453000 audit[3159]: AVC avc: denied { perfmon } for pid=3159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.453000 audit[3159]: AVC avc: denied { perfmon } for pid=3159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.453000 audit[3159]: AVC avc: denied { perfmon } for pid=3159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.453000 audit[3159]: AVC avc: denied { bpf } for pid=3159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.453000 audit[3159]: AVC avc: denied { bpf } for pid=3159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:40.453000 audit: BPF prog-id=122 op=LOAD May 17 00:50:40.453000 audit[3159]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2981 pid=3159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:40.453000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239333237653263393365323165323033383635613762383431366639 May 17 00:50:40.474803 env[1476]: time="2025-05-17T00:50:40.474757933Z" level=info msg="StartContainer for \"29327e2c93e21e203865a7b8416f9330080e80ea38f8a6131f966e9981605bd7\" returns successfully" May 17 00:50:40.811851 kubelet[1921]: E0517 00:50:40.811799 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:50:40.875683 kubelet[1921]: I0517 00:50:40.875648 1921 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 17 00:50:40.876113 kubelet[1921]: I0517 00:50:40.875825 1921 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 17 00:50:40.948251 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3481547540.mount: Deactivated successfully. May 17 00:50:41.399120 systemd-networkd[1629]: cali60e51b789ff: Gained IPv6LL May 17 00:50:41.812038 kubelet[1921]: E0517 00:50:41.811914 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:50:42.813075 kubelet[1921]: E0517 00:50:42.813004 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:50:43.225740 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2888784786.mount: Deactivated successfully. May 17 00:50:43.813144 kubelet[1921]: E0517 00:50:43.813101 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:50:44.813942 kubelet[1921]: E0517 00:50:44.813898 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:50:45.353635 env[1476]: time="2025-05-17T00:50:45.353583622Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:50:45.361847 env[1476]: time="2025-05-17T00:50:45.361800607Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:50:45.367256 env[1476]: time="2025-05-17T00:50:45.367203281Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:50:45.372936 env[1476]: time="2025-05-17T00:50:45.372898902Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:50:45.373682 env[1476]: time="2025-05-17T00:50:45.373656147Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685\"" May 17 00:50:45.376368 env[1476]: time="2025-05-17T00:50:45.376335265Z" level=info msg="CreateContainer within sandbox \"ae242e38f6dfdcbf3a55b5796c232e063ae09b071b22262cbdebd18e2447af73\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" May 17 00:50:45.421487 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1594685125.mount: Deactivated successfully. May 17 00:50:45.426663 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount739555800.mount: Deactivated successfully. May 17 00:50:45.455263 env[1476]: time="2025-05-17T00:50:45.455215432Z" level=info msg="CreateContainer within sandbox \"ae242e38f6dfdcbf3a55b5796c232e063ae09b071b22262cbdebd18e2447af73\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"3b6fc07ed7bd0f0627179f4fa7e0bf31a8438bb9777764a754a250c982601523\"" May 17 00:50:45.456000 env[1476]: time="2025-05-17T00:50:45.455920800Z" level=info msg="StartContainer for \"3b6fc07ed7bd0f0627179f4fa7e0bf31a8438bb9777764a754a250c982601523\"" May 17 00:50:45.473385 systemd[1]: Started cri-containerd-3b6fc07ed7bd0f0627179f4fa7e0bf31a8438bb9777764a754a250c982601523.scope. May 17 00:50:45.496017 kernel: kauditd_printk_skb: 148 callbacks suppressed May 17 00:50:45.496127 kernel: audit: type=1400 audit(1747443045.489:734): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:45.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:45.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:45.529822 kernel: audit: type=1400 audit(1747443045.489:735): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:45.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:45.546757 kernel: audit: type=1400 audit(1747443045.489:736): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:45.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:45.564995 kernel: audit: type=1400 audit(1747443045.489:737): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:45.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:45.583561 kernel: audit: type=1400 audit(1747443045.489:738): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:45.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:45.601747 kernel: audit: type=1400 audit(1747443045.489:739): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:45.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:45.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:45.623130 kernel: audit: type=1400 audit(1747443045.489:740): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:45.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:45.661109 kernel: audit: type=1400 audit(1747443045.489:741): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:45.661221 kernel: audit: type=1400 audit(1747443045.489:742): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:45.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:45.679137 kernel: audit: type=1400 audit(1747443045.494:743): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:45.494000 audit: BPF prog-id=123 op=LOAD May 17 00:50:45.511000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:45.511000 audit[3207]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=3115 pid=3207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:45.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362366663303765643762643066303632373137396634666137653062 May 17 00:50:45.511000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:45.511000 audit[3207]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3115 pid=3207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:45.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362366663303765643762643066303632373137396634666137653062 May 17 00:50:45.511000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:45.511000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:45.511000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:45.511000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:45.511000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:45.511000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:45.511000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:45.511000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:45.511000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:45.511000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:45.511000 audit: BPF prog-id=124 op=LOAD May 17 00:50:45.511000 audit[3207]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3115 pid=3207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:45.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362366663303765643762643066303632373137396634666137653062 May 17 00:50:45.528000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:45.528000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:45.528000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:45.528000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:45.528000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:45.528000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:45.528000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:45.528000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:45.528000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:45.528000 audit: BPF prog-id=125 op=LOAD May 17 00:50:45.528000 audit[3207]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3115 pid=3207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:45.528000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362366663303765643762643066303632373137396634666137653062 May 17 00:50:45.529000 audit: BPF prog-id=125 op=UNLOAD May 17 00:50:45.529000 audit: BPF prog-id=124 op=UNLOAD May 17 00:50:45.529000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:45.529000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:45.529000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:45.529000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:45.529000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:45.529000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:45.529000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:45.529000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:45.529000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:45.529000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:50:45.529000 audit: BPF prog-id=126 op=LOAD May 17 00:50:45.529000 audit[3207]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3115 pid=3207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:45.680914 env[1476]: time="2025-05-17T00:50:45.680875912Z" level=info msg="StartContainer for \"3b6fc07ed7bd0f0627179f4fa7e0bf31a8438bb9777764a754a250c982601523\" returns successfully" May 17 00:50:45.529000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362366663303765643762643066303632373137396634666137653062 May 17 00:50:45.693000 audit[3234]: AVC avc: denied { search } for pid=3234 comm="rpcbind" name="crypto" dev="proc" ino=19993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c41,c175 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 17 00:50:45.693000 audit[3234]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff8e8ef000 a2=0 a3=0 items=0 ppid=3218 pid=3234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c41,c175 key=(null) May 17 00:50:45.693000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 May 17 00:50:45.731000 audit[3239]: AVC avc: denied { search } for pid=3239 comm="dbus-daemon" name="crypto" dev="proc" ino=19993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c41,c175 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 17 00:50:45.731000 audit[3239]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffb5a9f000 a2=0 a3=0 items=0 ppid=3218 pid=3239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c41,c175 key=(null) May 17 00:50:45.731000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 17 00:50:45.735000 audit[3240]: AVC avc: denied { watch } for pid=3240 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537498 scontext=system_u:system_r:svirt_lxc_net_t:s0:c41,c175 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c41,c175 tclass=dir permissive=0 May 17 00:50:45.735000 audit[3240]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=aaaafac70a40 a2=2c8 a3=aaaafac6ba60 items=0 ppid=3218 pid=3240 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c41,c175 key=(null) May 17 00:50:45.735000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 17 00:50:45.739000 audit[3241]: AVC avc: denied { read } for pid=3241 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=21448 scontext=system_u:system_r:svirt_lxc_net_t:s0:c41,c175 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 May 17 00:50:45.739000 audit[3241]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffff9c a1=ffffbd78a570 a2=80000 a3=0 items=0 ppid=3218 pid=3241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c41,c175 key=(null) May 17 00:50:45.739000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 17 00:50:45.740000 audit[3241]: AVC avc: denied { search } for pid=3241 comm="ganesha.nfsd" name="crypto" dev="proc" ino=19993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c41,c175 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 17 00:50:45.740000 audit[3241]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffbcb1f000 a2=0 a3=0 items=0 ppid=3218 pid=3241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c41,c175 key=(null) May 17 00:50:45.740000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 17 00:50:45.814586 kubelet[1921]: E0517 00:50:45.814546 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:50:45.980716 kubelet[1921]: I0517 00:50:45.979465 1921 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.746676135 podStartE2EDuration="6.979439271s" podCreationTimestamp="2025-05-17 00:50:39 +0000 UTC" firstStartedPulling="2025-05-17 00:50:40.142132635 +0000 UTC m=+33.459008507" lastFinishedPulling="2025-05-17 00:50:45.374895771 +0000 UTC m=+38.691771643" observedRunningTime="2025-05-17 00:50:45.978505673 +0000 UTC m=+39.295381505" watchObservedRunningTime="2025-05-17 00:50:45.979439271 +0000 UTC m=+39.296315143" May 17 00:50:45.981062 kubelet[1921]: I0517 00:50:45.981024 1921 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-wfbrr" podStartSLOduration=34.803354901 podStartE2EDuration="37.981013799s" podCreationTimestamp="2025-05-17 00:50:08 +0000 UTC" firstStartedPulling="2025-05-17 00:50:37.186335983 +0000 UTC m=+30.503211855" lastFinishedPulling="2025-05-17 00:50:40.363994882 +0000 UTC m=+33.680870753" observedRunningTime="2025-05-17 00:50:40.952105161 +0000 UTC m=+34.268980993" watchObservedRunningTime="2025-05-17 00:50:45.981013799 +0000 UTC m=+39.297889671" May 17 00:50:46.008000 audit[3246]: NETFILTER_CFG table=filter:78 family=2 entries=24 op=nft_register_rule pid=3246 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:50:46.008000 audit[3246]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffe76d30d0 a2=0 a3=1 items=0 ppid=2105 pid=3246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:46.008000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:50:46.014000 audit[3246]: NETFILTER_CFG table=nat:79 family=2 entries=106 op=nft_register_chain pid=3246 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:50:46.014000 audit[3246]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffe76d30d0 a2=0 a3=1 items=0 ppid=2105 pid=3246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:46.014000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:50:46.814942 kubelet[1921]: E0517 00:50:46.814885 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:50:47.772712 kubelet[1921]: E0517 00:50:47.772674 1921 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:50:47.815320 kubelet[1921]: E0517 00:50:47.815295 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:50:48.815873 kubelet[1921]: E0517 00:50:48.815832 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:50:49.816885 kubelet[1921]: E0517 00:50:49.816850 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:50:50.817605 kubelet[1921]: E0517 00:50:50.817564 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:50:51.818073 kubelet[1921]: E0517 00:50:51.818037 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:50:52.819301 kubelet[1921]: E0517 00:50:52.819264 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:50:53.820405 kubelet[1921]: E0517 00:50:53.820367 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:50:54.820491 kubelet[1921]: E0517 00:50:54.820443 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:50:55.821307 kubelet[1921]: E0517 00:50:55.821231 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:50:56.821878 kubelet[1921]: E0517 00:50:56.821840 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:50:57.822206 kubelet[1921]: E0517 00:50:57.822169 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:50:58.822794 kubelet[1921]: E0517 00:50:58.822745 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:50:59.823483 kubelet[1921]: E0517 00:50:59.823452 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:51:00.823945 kubelet[1921]: E0517 00:51:00.823908 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:51:01.824293 kubelet[1921]: E0517 00:51:01.824258 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:51:02.825488 kubelet[1921]: E0517 00:51:02.825457 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:51:03.826879 kubelet[1921]: E0517 00:51:03.826847 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:51:04.827732 kubelet[1921]: E0517 00:51:04.827702 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:51:05.828729 kubelet[1921]: E0517 00:51:05.828690 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:51:06.829798 kubelet[1921]: E0517 00:51:06.829765 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:51:07.772025 kubelet[1921]: E0517 00:51:07.771991 1921 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:51:07.803283 env[1476]: time="2025-05-17T00:51:07.803241227Z" level=info msg="StopPodSandbox for \"609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921\"" May 17 00:51:07.830538 kubelet[1921]: E0517 00:51:07.830486 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:51:07.869825 env[1476]: 2025-05-17 00:51:07.834 [WARNING][3284] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.28-k8s-csi--node--driver--wfbrr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"8a14b7c5-5085-44c4-a97d-df8fa59ba1ab", ResourceVersion:"1520", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 50, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"68bf44dd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.28", ContainerID:"c69ace882f2ae10655648b9ffb5aa5432b0715c20a8b6e85449d8c47c66ba45f", Pod:"csi-node-driver-wfbrr", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.124.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali868025527bb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:51:07.869825 env[1476]: 2025-05-17 00:51:07.834 [INFO][3284] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921" May 17 00:51:07.869825 env[1476]: 2025-05-17 00:51:07.834 [INFO][3284] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921" iface="eth0" netns="" May 17 00:51:07.869825 env[1476]: 2025-05-17 00:51:07.834 [INFO][3284] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921" May 17 00:51:07.869825 env[1476]: 2025-05-17 00:51:07.834 [INFO][3284] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921" May 17 00:51:07.869825 env[1476]: 2025-05-17 00:51:07.852 [INFO][3292] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921" HandleID="k8s-pod-network.609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921" Workload="10.200.20.28-k8s-csi--node--driver--wfbrr-eth0" May 17 00:51:07.869825 env[1476]: 2025-05-17 00:51:07.852 [INFO][3292] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:51:07.869825 env[1476]: 2025-05-17 00:51:07.852 [INFO][3292] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:51:07.869825 env[1476]: 2025-05-17 00:51:07.862 [WARNING][3292] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921" HandleID="k8s-pod-network.609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921" Workload="10.200.20.28-k8s-csi--node--driver--wfbrr-eth0" May 17 00:51:07.869825 env[1476]: 2025-05-17 00:51:07.862 [INFO][3292] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921" HandleID="k8s-pod-network.609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921" Workload="10.200.20.28-k8s-csi--node--driver--wfbrr-eth0" May 17 00:51:07.869825 env[1476]: 2025-05-17 00:51:07.866 [INFO][3292] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:51:07.869825 env[1476]: 2025-05-17 00:51:07.867 [INFO][3284] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921" May 17 00:51:07.869825 env[1476]: time="2025-05-17T00:51:07.869100527Z" level=info msg="TearDown network for sandbox \"609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921\" successfully" May 17 00:51:07.869825 env[1476]: time="2025-05-17T00:51:07.869128487Z" level=info msg="StopPodSandbox for \"609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921\" returns successfully" May 17 00:51:07.870311 env[1476]: time="2025-05-17T00:51:07.870029222Z" level=info msg="RemovePodSandbox for \"609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921\"" May 17 00:51:07.870311 env[1476]: time="2025-05-17T00:51:07.870055141Z" level=info msg="Forcibly stopping sandbox \"609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921\"" May 17 00:51:07.953037 env[1476]: 2025-05-17 00:51:07.906 [WARNING][3309] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.28-k8s-csi--node--driver--wfbrr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"8a14b7c5-5085-44c4-a97d-df8fa59ba1ab", ResourceVersion:"1520", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 50, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"68bf44dd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.28", ContainerID:"c69ace882f2ae10655648b9ffb5aa5432b0715c20a8b6e85449d8c47c66ba45f", Pod:"csi-node-driver-wfbrr", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.124.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali868025527bb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:51:07.953037 env[1476]: 2025-05-17 00:51:07.906 [INFO][3309] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921" May 17 00:51:07.953037 env[1476]: 2025-05-17 00:51:07.906 [INFO][3309] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921" iface="eth0" netns="" May 17 00:51:07.953037 env[1476]: 2025-05-17 00:51:07.906 [INFO][3309] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921" May 17 00:51:07.953037 env[1476]: 2025-05-17 00:51:07.906 [INFO][3309] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921" May 17 00:51:07.953037 env[1476]: 2025-05-17 00:51:07.930 [INFO][3317] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921" HandleID="k8s-pod-network.609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921" Workload="10.200.20.28-k8s-csi--node--driver--wfbrr-eth0" May 17 00:51:07.953037 env[1476]: 2025-05-17 00:51:07.931 [INFO][3317] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:51:07.953037 env[1476]: 2025-05-17 00:51:07.931 [INFO][3317] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:51:07.953037 env[1476]: 2025-05-17 00:51:07.948 [WARNING][3317] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921" HandleID="k8s-pod-network.609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921" Workload="10.200.20.28-k8s-csi--node--driver--wfbrr-eth0" May 17 00:51:07.953037 env[1476]: 2025-05-17 00:51:07.949 [INFO][3317] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921" HandleID="k8s-pod-network.609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921" Workload="10.200.20.28-k8s-csi--node--driver--wfbrr-eth0" May 17 00:51:07.953037 env[1476]: 2025-05-17 00:51:07.950 [INFO][3317] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:51:07.953037 env[1476]: 2025-05-17 00:51:07.951 [INFO][3309] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921" May 17 00:51:07.953518 env[1476]: time="2025-05-17T00:51:07.953047699Z" level=info msg="TearDown network for sandbox \"609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921\" successfully" May 17 00:51:07.965304 env[1476]: time="2025-05-17T00:51:07.965255929Z" level=info msg="RemovePodSandbox \"609e6d7691846393d5f663636bc94eae72d2cde7f8e93f5e774c38bdb5879921\" returns successfully" May 17 00:51:08.830863 kubelet[1921]: E0517 00:51:08.830824 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:51:09.434498 systemd[1]: run-containerd-runc-k8s.io-3bf8248740ac8850ca1033bbdd9f472dcaa5a638aa4a2e391e4cd84d6700c665-runc.Qnyx9x.mount: Deactivated successfully. May 17 00:51:09.831245 kubelet[1921]: E0517 00:51:09.831128 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:51:10.481508 systemd[1]: Created slice kubepods-besteffort-podce2b5bc8_a881_43e4_b8d6_8a9ebf540dc2.slice. May 17 00:51:10.575323 kubelet[1921]: I0517 00:51:10.575287 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hfphz\" (UniqueName: \"kubernetes.io/projected/ce2b5bc8-a881-43e4-b8d6-8a9ebf540dc2-kube-api-access-hfphz\") pod \"test-pod-1\" (UID: \"ce2b5bc8-a881-43e4-b8d6-8a9ebf540dc2\") " pod="default/test-pod-1" May 17 00:51:10.575472 kubelet[1921]: I0517 00:51:10.575336 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-f27bfc04-8e75-4683-8c18-eb2a7b0b639d\" (UniqueName: \"kubernetes.io/nfs/ce2b5bc8-a881-43e4-b8d6-8a9ebf540dc2-pvc-f27bfc04-8e75-4683-8c18-eb2a7b0b639d\") pod \"test-pod-1\" (UID: \"ce2b5bc8-a881-43e4-b8d6-8a9ebf540dc2\") " pod="default/test-pod-1" May 17 00:51:10.796000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:10.824993 kernel: kauditd_printk_skb: 68 callbacks suppressed May 17 00:51:10.825138 kernel: audit: type=1400 audit(1747443070.796:759): avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:10.825179 kernel: Failed to create system directory netfs May 17 00:51:10.796000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:10.853578 kernel: Failed to create system directory netfs May 17 00:51:10.853679 kernel: audit: type=1400 audit(1747443070.796:759): avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:10.853709 kernel: Failed to create system directory netfs May 17 00:51:10.853838 kubelet[1921]: E0517 00:51:10.853811 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:51:10.796000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:10.878726 kernel: audit: type=1400 audit(1747443070.796:759): avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:10.878845 kernel: Failed to create system directory netfs May 17 00:51:10.796000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:10.886754 kernel: audit: type=1400 audit(1747443070.796:759): avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:10.796000 audit[3347]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab09ea55e0 a1=12c14 a2=aaaad659e028 a3=aaab09e96010 items=0 ppid=554 pid=3347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:10.934096 kernel: audit: type=1300 audit(1747443070.796:759): arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab09ea55e0 a1=12c14 a2=aaaad659e028 a3=aaab09e96010 items=0 ppid=554 pid=3347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:10.934262 kernel: audit: type=1327 audit(1747443070.796:759): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 17 00:51:10.796000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 17 00:51:10.949699 kernel: Failed to create system directory fscache May 17 00:51:10.949813 kernel: audit: type=1400 audit(1747443070.933:760): avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:10.933000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:10.975075 kernel: Failed to create system directory fscache May 17 00:51:10.975154 kernel: audit: type=1400 audit(1747443070.933:760): avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:10.933000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.002161 kernel: Failed to create system directory fscache May 17 00:51:11.002292 kernel: audit: type=1400 audit(1747443070.933:760): avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:10.933000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:10.933000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.057660 kernel: Failed to create system directory fscache May 17 00:51:11.057760 kernel: audit: type=1400 audit(1747443070.933:760): avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.057781 kernel: Failed to create system directory fscache May 17 00:51:10.933000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:10.933000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.063086 kernel: Failed to create system directory fscache May 17 00:51:10.933000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.067921 kernel: Failed to create system directory fscache May 17 00:51:10.933000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.072846 kernel: Failed to create system directory fscache May 17 00:51:10.933000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.077031 kernel: Failed to create system directory fscache May 17 00:51:10.933000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.086055 kernel: Failed to create system directory fscache May 17 00:51:11.086196 kernel: Failed to create system directory fscache May 17 00:51:10.933000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:10.933000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.095054 kernel: Failed to create system directory fscache May 17 00:51:10.933000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.099613 kernel: Failed to create system directory fscache May 17 00:51:11.099696 kernel: Failed to create system directory fscache May 17 00:51:10.933000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.107370 kernel: FS-Cache: Loaded May 17 00:51:10.933000 audit[3347]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab0a0b8210 a1=4c344 a2=aaaad659e028 a3=aaab09e96010 items=0 ppid=554 pid=3347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:10.933000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.196842 kernel: Failed to create system directory sunrpc May 17 00:51:11.196936 kernel: Failed to create system directory sunrpc May 17 00:51:11.196963 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.205576 kernel: Failed to create system directory sunrpc May 17 00:51:11.205632 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.214694 kernel: Failed to create system directory sunrpc May 17 00:51:11.214752 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.219008 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.227600 kernel: Failed to create system directory sunrpc May 17 00:51:11.227656 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.236344 kernel: Failed to create system directory sunrpc May 17 00:51:11.236384 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.245386 kernel: Failed to create system directory sunrpc May 17 00:51:11.245424 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.253681 kernel: Failed to create system directory sunrpc May 17 00:51:11.253741 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.262665 kernel: Failed to create system directory sunrpc May 17 00:51:11.262748 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.266936 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.275320 kernel: Failed to create system directory sunrpc May 17 00:51:11.275378 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.283249 kernel: Failed to create system directory sunrpc May 17 00:51:11.283332 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.291419 kernel: Failed to create system directory sunrpc May 17 00:51:11.291469 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.295623 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.303331 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.308024 kernel: Failed to create system directory sunrpc May 17 00:51:11.308059 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.316028 kernel: Failed to create system directory sunrpc May 17 00:51:11.316063 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.323785 kernel: Failed to create system directory sunrpc May 17 00:51:11.323840 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.331294 kernel: Failed to create system directory sunrpc May 17 00:51:11.331350 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.338927 kernel: Failed to create system directory sunrpc May 17 00:51:11.338998 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.346591 kernel: Failed to create system directory sunrpc May 17 00:51:11.346647 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.354698 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.359380 kernel: Failed to create system directory sunrpc May 17 00:51:11.359434 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.368053 kernel: Failed to create system directory sunrpc May 17 00:51:11.368110 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.371879 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.375934 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.383785 kernel: Failed to create system directory sunrpc May 17 00:51:11.383877 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.387577 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.391524 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.395366 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.399644 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.403562 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.411814 kernel: Failed to create system directory sunrpc May 17 00:51:11.411865 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.420050 kernel: Failed to create system directory sunrpc May 17 00:51:11.420136 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.427749 kernel: Failed to create system directory sunrpc May 17 00:51:11.427782 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.431521 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.435252 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.438938 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.442856 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.447126 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.451164 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.459431 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.463732 kernel: Failed to create system directory sunrpc May 17 00:51:11.463787 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.468750 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.475041 kernel: Failed to create system directory sunrpc May 17 00:51:11.475097 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.482971 kernel: Failed to create system directory sunrpc May 17 00:51:11.483106 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.486849 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.490661 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.498268 kernel: Failed to create system directory sunrpc May 17 00:51:11.498318 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.505519 kernel: Failed to create system directory sunrpc May 17 00:51:11.505554 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.509457 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.517604 kernel: Failed to create system directory sunrpc May 17 00:51:11.517665 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.525558 kernel: Failed to create system directory sunrpc May 17 00:51:11.525618 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.533105 kernel: Failed to create system directory sunrpc May 17 00:51:11.533167 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.536819 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.540863 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.548259 kernel: Failed to create system directory sunrpc May 17 00:51:11.548311 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.551915 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.555787 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.563669 kernel: Failed to create system directory sunrpc May 17 00:51:11.563725 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.572143 kernel: Failed to create system directory sunrpc May 17 00:51:11.572191 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.575852 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.579679 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.583263 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.587284 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.590986 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.594641 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.598401 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.602241 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.607050 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.610980 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.614795 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.622831 kernel: Failed to create system directory sunrpc May 17 00:51:11.622928 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.626420 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.630348 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.634190 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.638076 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.641816 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.645596 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.649366 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.653209 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.657005 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.661066 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.664698 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.673782 kernel: Failed to create system directory sunrpc May 17 00:51:11.673860 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.678823 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.682918 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.686751 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.690435 kernel: Failed to create system directory sunrpc May 17 00:51:11.182000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.706528 kernel: RPC: Registered named UNIX socket transport module. May 17 00:51:11.706616 kernel: RPC: Registered udp transport module. May 17 00:51:11.706693 kernel: RPC: Registered tcp transport module. May 17 00:51:11.709937 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. May 17 00:51:11.182000 audit[3347]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab0a104560 a1=14a72c a2=aaaad659e028 a3=aaab09e96010 items=6 ppid=554 pid=3347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:11.182000 audit: CWD cwd="/" May 17 00:51:11.182000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:51:11.182000 audit: PATH item=1 name=(null) inode=21812 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:51:11.182000 audit: PATH item=2 name=(null) inode=21812 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:51:11.182000 audit: PATH item=3 name=(null) inode=21813 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:51:11.182000 audit: PATH item=4 name=(null) inode=21812 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:51:11.182000 audit: PATH item=5 name=(null) inode=21814 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:51:11.182000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.824852 kernel: Failed to create system directory nfs May 17 00:51:11.824962 kernel: Failed to create system directory nfs May 17 00:51:11.825010 kernel: Failed to create system directory nfs May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.828582 kernel: Failed to create system directory nfs May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.835942 kernel: Failed to create system directory nfs May 17 00:51:11.836003 kernel: Failed to create system directory nfs May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.843340 kernel: Failed to create system directory nfs May 17 00:51:11.843374 kernel: Failed to create system directory nfs May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.850612 kernel: Failed to create system directory nfs May 17 00:51:11.850663 kernel: Failed to create system directory nfs May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.854793 kubelet[1921]: E0517 00:51:11.854737 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:51:11.858414 kernel: Failed to create system directory nfs May 17 00:51:11.858463 kernel: Failed to create system directory nfs May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.865859 kernel: Failed to create system directory nfs May 17 00:51:11.865909 kernel: Failed to create system directory nfs May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.873584 kernel: Failed to create system directory nfs May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.877601 kernel: Failed to create system directory nfs May 17 00:51:11.877647 kernel: Failed to create system directory nfs May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.885279 kernel: Failed to create system directory nfs May 17 00:51:11.885312 kernel: Failed to create system directory nfs May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.889026 kernel: Failed to create system directory nfs May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.896396 kernel: Failed to create system directory nfs May 17 00:51:11.896477 kernel: Failed to create system directory nfs May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.900139 kernel: Failed to create system directory nfs May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.903849 kernel: Failed to create system directory nfs May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.907590 kernel: Failed to create system directory nfs May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.911151 kernel: Failed to create system directory nfs May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.914979 kernel: Failed to create system directory nfs May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.918728 kernel: Failed to create system directory nfs May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.922500 kernel: Failed to create system directory nfs May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.930260 kernel: Failed to create system directory nfs May 17 00:51:11.930338 kernel: Failed to create system directory nfs May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.938025 kernel: Failed to create system directory nfs May 17 00:51:11.938064 kernel: Failed to create system directory nfs May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.945201 kernel: Failed to create system directory nfs May 17 00:51:11.945248 kernel: Failed to create system directory nfs May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.952773 kernel: Failed to create system directory nfs May 17 00:51:11.952826 kernel: Failed to create system directory nfs May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.960148 kernel: Failed to create system directory nfs May 17 00:51:11.960195 kernel: Failed to create system directory nfs May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.967642 kernel: Failed to create system directory nfs May 17 00:51:11.967694 kernel: Failed to create system directory nfs May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.971341 kernel: Failed to create system directory nfs May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.975291 kernel: Failed to create system directory nfs May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.983040 kernel: Failed to create system directory nfs May 17 00:51:11.983069 kernel: Failed to create system directory nfs May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.990292 kernel: Failed to create system directory nfs May 17 00:51:11.990326 kernel: Failed to create system directory nfs May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.994120 kernel: Failed to create system directory nfs May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.997867 kernel: Failed to create system directory nfs May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.001551 kernel: Failed to create system directory nfs May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.005084 kernel: Failed to create system directory nfs May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.008611 kernel: Failed to create system directory nfs May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.012249 kernel: Failed to create system directory nfs May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.015999 kernel: Failed to create system directory nfs May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.019521 kernel: Failed to create system directory nfs May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.023058 kernel: Failed to create system directory nfs May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.026632 kernel: Failed to create system directory nfs May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.034405 kernel: Failed to create system directory nfs May 17 00:51:12.034530 kernel: Failed to create system directory nfs May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:11.812000 audit[3347]: AVC avc: denied { confidentiality } for pid=3347 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.041695 kernel: Failed to create system directory nfs May 17 00:51:11.812000 audit[3347]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab0a2ad9f0 a1=1162dc a2=aaaad659e028 a3=aaab09e96010 items=0 ppid=554 pid=3347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:11.812000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 17 00:51:12.061044 kernel: FS-Cache: Netfs 'nfs' registered for caching May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.121171 kernel: Failed to create system directory nfs4 May 17 00:51:12.121264 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.125212 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.129504 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.133759 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.137995 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.142195 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.146207 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.150095 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.153855 kernel: Failed to create system directory nfs4 May 17 00:51:12.153914 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.162053 kernel: Failed to create system directory nfs4 May 17 00:51:12.162150 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.169993 kernel: Failed to create system directory nfs4 May 17 00:51:12.170057 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.177904 kernel: Failed to create system directory nfs4 May 17 00:51:12.177938 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.185663 kernel: Failed to create system directory nfs4 May 17 00:51:12.185719 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.193245 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.197352 kernel: Failed to create system directory nfs4 May 17 00:51:12.197408 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.205370 kernel: Failed to create system directory nfs4 May 17 00:51:12.205443 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.213374 kernel: Failed to create system directory nfs4 May 17 00:51:12.213437 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.221521 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.225475 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.229487 kernel: Failed to create system directory nfs4 May 17 00:51:12.229556 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.237210 kernel: Failed to create system directory nfs4 May 17 00:51:12.237272 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.244658 kernel: Failed to create system directory nfs4 May 17 00:51:12.244711 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.252885 kernel: Failed to create system directory nfs4 May 17 00:51:12.252998 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.260506 kernel: Failed to create system directory nfs4 May 17 00:51:12.260553 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.268407 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.272638 kernel: Failed to create system directory nfs4 May 17 00:51:12.272685 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.279934 kernel: Failed to create system directory nfs4 May 17 00:51:12.279997 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.287724 kernel: Failed to create system directory nfs4 May 17 00:51:12.287791 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.295569 kernel: Failed to create system directory nfs4 May 17 00:51:12.295624 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.303096 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.306872 kernel: Failed to create system directory nfs4 May 17 00:51:12.306900 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.314691 kernel: Failed to create system directory nfs4 May 17 00:51:12.314790 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.322474 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.326392 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.330321 kernel: Failed to create system directory nfs4 May 17 00:51:12.330383 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.337725 kernel: Failed to create system directory nfs4 May 17 00:51:12.337776 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.345311 kernel: Failed to create system directory nfs4 May 17 00:51:12.345360 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.354023 kernel: Failed to create system directory nfs4 May 17 00:51:12.354089 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.361985 kernel: Failed to create system directory nfs4 May 17 00:51:12.362026 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.370746 kernel: Failed to create system directory nfs4 May 17 00:51:12.376060 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.380451 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.384230 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.388017 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.391837 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.395769 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.399993 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.403966 kernel: Failed to create system directory nfs4 May 17 00:51:12.404157 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.412168 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.416428 kernel: Failed to create system directory nfs4 May 17 00:51:12.416525 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.420324 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.424040 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.432131 kernel: Failed to create system directory nfs4 May 17 00:51:12.432176 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.439545 kernel: Failed to create system directory nfs4 May 17 00:51:12.439624 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.447343 kernel: Failed to create system directory nfs4 May 17 00:51:12.447373 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.454857 kernel: Failed to create system directory nfs4 May 17 00:51:12.454953 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.466680 kernel: Failed to create system directory nfs4 May 17 00:51:12.466716 kernel: Failed to create system directory nfs4 May 17 00:51:12.466766 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.474642 kernel: Failed to create system directory nfs4 May 17 00:51:12.474698 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.478492 kernel: Failed to create system directory nfs4 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.105000 audit[3358]: AVC avc: denied { confidentiality } for pid=3358 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.486336 kernel: Failed to create system directory nfs4 May 17 00:51:12.592355 kernel: NFS: Registering the id_resolver key type May 17 00:51:12.592445 kernel: Key type id_resolver registered May 17 00:51:12.592474 kernel: Key type id_legacy registered May 17 00:51:12.105000 audit[3358]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffffa42ba010 a1=19c694 a2=aaaac282e028 a3=aaaacc91e010 items=0 ppid=554 pid=3358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:12.105000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 May 17 00:51:12.616000 audit[3361]: AVC avc: denied { confidentiality } for pid=3361 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.616000 audit[3361]: AVC avc: denied { confidentiality } for pid=3361 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.625067 kernel: Failed to create system directory rpcgss May 17 00:51:12.625130 kernel: Failed to create system directory rpcgss May 17 00:51:12.616000 audit[3361]: AVC avc: denied { confidentiality } for pid=3361 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.632001 kernel: Failed to create system directory rpcgss May 17 00:51:12.616000 audit[3361]: AVC avc: denied { confidentiality } for pid=3361 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.636248 kernel: Failed to create system directory rpcgss May 17 00:51:12.616000 audit[3361]: AVC avc: denied { confidentiality } for pid=3361 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.640695 kernel: Failed to create system directory rpcgss May 17 00:51:12.640762 kernel: Failed to create system directory rpcgss May 17 00:51:12.616000 audit[3361]: AVC avc: denied { confidentiality } for pid=3361 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.644747 kernel: Failed to create system directory rpcgss May 17 00:51:12.616000 audit[3361]: AVC avc: denied { confidentiality } for pid=3361 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.649082 kernel: Failed to create system directory rpcgss May 17 00:51:12.616000 audit[3361]: AVC avc: denied { confidentiality } for pid=3361 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.653057 kernel: Failed to create system directory rpcgss May 17 00:51:12.616000 audit[3361]: AVC avc: denied { confidentiality } for pid=3361 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.656962 kernel: Failed to create system directory rpcgss May 17 00:51:12.616000 audit[3361]: AVC avc: denied { confidentiality } for pid=3361 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.661415 kernel: Failed to create system directory rpcgss May 17 00:51:12.616000 audit[3361]: AVC avc: denied { confidentiality } for pid=3361 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.666069 kernel: Failed to create system directory rpcgss May 17 00:51:12.616000 audit[3361]: AVC avc: denied { confidentiality } for pid=3361 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.616000 audit[3361]: AVC avc: denied { confidentiality } for pid=3361 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.674017 kernel: Failed to create system directory rpcgss May 17 00:51:12.674047 kernel: Failed to create system directory rpcgss May 17 00:51:12.616000 audit[3361]: AVC avc: denied { confidentiality } for pid=3361 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.616000 audit[3361]: AVC avc: denied { confidentiality } for pid=3361 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.681844 kernel: Failed to create system directory rpcgss May 17 00:51:12.681870 kernel: Failed to create system directory rpcgss May 17 00:51:12.616000 audit[3361]: AVC avc: denied { confidentiality } for pid=3361 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.616000 audit[3361]: AVC avc: denied { confidentiality } for pid=3361 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.689459 kernel: Failed to create system directory rpcgss May 17 00:51:12.689486 kernel: Failed to create system directory rpcgss May 17 00:51:12.616000 audit[3361]: AVC avc: denied { confidentiality } for pid=3361 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.616000 audit[3361]: AVC avc: denied { confidentiality } for pid=3361 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.697706 kernel: Failed to create system directory rpcgss May 17 00:51:12.697752 kernel: Failed to create system directory rpcgss May 17 00:51:12.616000 audit[3361]: AVC avc: denied { confidentiality } for pid=3361 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.616000 audit[3361]: AVC avc: denied { confidentiality } for pid=3361 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.705347 kernel: Failed to create system directory rpcgss May 17 00:51:12.705377 kernel: Failed to create system directory rpcgss May 17 00:51:12.616000 audit[3361]: AVC avc: denied { confidentiality } for pid=3361 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.616000 audit[3361]: AVC avc: denied { confidentiality } for pid=3361 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.712872 kernel: Failed to create system directory rpcgss May 17 00:51:12.713004 kernel: Failed to create system directory rpcgss May 17 00:51:12.616000 audit[3361]: AVC avc: denied { confidentiality } for pid=3361 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.616000 audit[3361]: AVC avc: denied { confidentiality } for pid=3361 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.720753 kernel: Failed to create system directory rpcgss May 17 00:51:12.720819 kernel: Failed to create system directory rpcgss May 17 00:51:12.616000 audit[3361]: AVC avc: denied { confidentiality } for pid=3361 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:51:12.616000 audit[3361]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffffabfd2010 a1=5ee7c a2=aaaae87ee028 a3=aaab06b5a010 items=0 ppid=554 pid=3361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:12.616000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 May 17 00:51:12.855077 kubelet[1921]: E0517 00:51:12.855023 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:51:12.998251 nfsidmap[3374]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.7-n-b41680b403' May 17 00:51:13.006353 nfsidmap[3376]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.7-n-b41680b403' May 17 00:51:13.016000 audit[1574]: AVC avc: denied { watch_reads } for pid=1574 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2835 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:51:13.016000 audit[1574]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaab0b295180 a2=10 a3=0 items=0 ppid=1 pid=1574 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:13.016000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 17 00:51:13.016000 audit[1574]: AVC avc: denied { watch_reads } for pid=1574 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2835 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:51:13.016000 audit[1574]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaab0b295180 a2=10 a3=0 items=0 ppid=1 pid=1574 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:13.016000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 17 00:51:13.016000 audit[1574]: AVC avc: denied { watch_reads } for pid=1574 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2835 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:51:13.016000 audit[1574]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaab0b295180 a2=10 a3=0 items=0 ppid=1 pid=1574 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:13.016000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 17 00:51:13.016000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2835 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:51:13.016000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2835 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:51:13.016000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2835 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:51:13.184474 env[1476]: time="2025-05-17T00:51:13.184410700Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:ce2b5bc8-a881-43e4-b8d6-8a9ebf540dc2,Namespace:default,Attempt:0,}" May 17 00:51:13.341094 systemd-networkd[1629]: cali5ec59c6bf6e: Link UP May 17 00:51:13.350362 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:51:13.350425 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready May 17 00:51:13.352401 systemd-networkd[1629]: cali5ec59c6bf6e: Gained carrier May 17 00:51:13.365276 env[1476]: 2025-05-17 00:51:13.273 [INFO][3377] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.28-k8s-test--pod--1-eth0 default ce2b5bc8-a881-43e4-b8d6-8a9ebf540dc2 1606 0 2025-05-17 00:50:40 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.28 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="71dd448658b0f64121fc196fc23ae2a0b449416c1abd4b9a9237c917f0645e8d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.28-k8s-test--pod--1-" May 17 00:51:13.365276 env[1476]: 2025-05-17 00:51:13.273 [INFO][3377] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="71dd448658b0f64121fc196fc23ae2a0b449416c1abd4b9a9237c917f0645e8d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.28-k8s-test--pod--1-eth0" May 17 00:51:13.365276 env[1476]: 2025-05-17 00:51:13.294 [INFO][3390] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="71dd448658b0f64121fc196fc23ae2a0b449416c1abd4b9a9237c917f0645e8d" HandleID="k8s-pod-network.71dd448658b0f64121fc196fc23ae2a0b449416c1abd4b9a9237c917f0645e8d" Workload="10.200.20.28-k8s-test--pod--1-eth0" May 17 00:51:13.365276 env[1476]: 2025-05-17 00:51:13.295 [INFO][3390] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="71dd448658b0f64121fc196fc23ae2a0b449416c1abd4b9a9237c917f0645e8d" HandleID="k8s-pod-network.71dd448658b0f64121fc196fc23ae2a0b449416c1abd4b9a9237c917f0645e8d" Workload="10.200.20.28-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002d7020), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.28", "pod":"test-pod-1", "timestamp":"2025-05-17 00:51:13.294947744 +0000 UTC"}, Hostname:"10.200.20.28", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:51:13.365276 env[1476]: 2025-05-17 00:51:13.295 [INFO][3390] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:51:13.365276 env[1476]: 2025-05-17 00:51:13.295 [INFO][3390] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:51:13.365276 env[1476]: 2025-05-17 00:51:13.295 [INFO][3390] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.28' May 17 00:51:13.365276 env[1476]: 2025-05-17 00:51:13.305 [INFO][3390] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.71dd448658b0f64121fc196fc23ae2a0b449416c1abd4b9a9237c917f0645e8d" host="10.200.20.28" May 17 00:51:13.365276 env[1476]: 2025-05-17 00:51:13.308 [INFO][3390] ipam/ipam.go 394: Looking up existing affinities for host host="10.200.20.28" May 17 00:51:13.365276 env[1476]: 2025-05-17 00:51:13.312 [INFO][3390] ipam/ipam.go 511: Trying affinity for 192.168.124.0/26 host="10.200.20.28" May 17 00:51:13.365276 env[1476]: 2025-05-17 00:51:13.314 [INFO][3390] ipam/ipam.go 158: Attempting to load block cidr=192.168.124.0/26 host="10.200.20.28" May 17 00:51:13.365276 env[1476]: 2025-05-17 00:51:13.316 [INFO][3390] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.124.0/26 host="10.200.20.28" May 17 00:51:13.365276 env[1476]: 2025-05-17 00:51:13.316 [INFO][3390] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.124.0/26 handle="k8s-pod-network.71dd448658b0f64121fc196fc23ae2a0b449416c1abd4b9a9237c917f0645e8d" host="10.200.20.28" May 17 00:51:13.365276 env[1476]: 2025-05-17 00:51:13.317 [INFO][3390] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.71dd448658b0f64121fc196fc23ae2a0b449416c1abd4b9a9237c917f0645e8d May 17 00:51:13.365276 env[1476]: 2025-05-17 00:51:13.324 [INFO][3390] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.124.0/26 handle="k8s-pod-network.71dd448658b0f64121fc196fc23ae2a0b449416c1abd4b9a9237c917f0645e8d" host="10.200.20.28" May 17 00:51:13.365276 env[1476]: 2025-05-17 00:51:13.332 [INFO][3390] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.124.4/26] block=192.168.124.0/26 handle="k8s-pod-network.71dd448658b0f64121fc196fc23ae2a0b449416c1abd4b9a9237c917f0645e8d" host="10.200.20.28" May 17 00:51:13.365276 env[1476]: 2025-05-17 00:51:13.332 [INFO][3390] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.124.4/26] handle="k8s-pod-network.71dd448658b0f64121fc196fc23ae2a0b449416c1abd4b9a9237c917f0645e8d" host="10.200.20.28" May 17 00:51:13.365276 env[1476]: 2025-05-17 00:51:13.332 [INFO][3390] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:51:13.365276 env[1476]: 2025-05-17 00:51:13.332 [INFO][3390] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.124.4/26] IPv6=[] ContainerID="71dd448658b0f64121fc196fc23ae2a0b449416c1abd4b9a9237c917f0645e8d" HandleID="k8s-pod-network.71dd448658b0f64121fc196fc23ae2a0b449416c1abd4b9a9237c917f0645e8d" Workload="10.200.20.28-k8s-test--pod--1-eth0" May 17 00:51:13.365276 env[1476]: 2025-05-17 00:51:13.334 [INFO][3377] cni-plugin/k8s.go 418: Populated endpoint ContainerID="71dd448658b0f64121fc196fc23ae2a0b449416c1abd4b9a9237c917f0645e8d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.28-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.28-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"ce2b5bc8-a881-43e4-b8d6-8a9ebf540dc2", ResourceVersion:"1606", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 50, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.28", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.124.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:51:13.365858 env[1476]: 2025-05-17 00:51:13.334 [INFO][3377] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.124.4/32] ContainerID="71dd448658b0f64121fc196fc23ae2a0b449416c1abd4b9a9237c917f0645e8d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.28-k8s-test--pod--1-eth0" May 17 00:51:13.365858 env[1476]: 2025-05-17 00:51:13.334 [INFO][3377] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="71dd448658b0f64121fc196fc23ae2a0b449416c1abd4b9a9237c917f0645e8d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.28-k8s-test--pod--1-eth0" May 17 00:51:13.365858 env[1476]: 2025-05-17 00:51:13.353 [INFO][3377] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="71dd448658b0f64121fc196fc23ae2a0b449416c1abd4b9a9237c917f0645e8d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.28-k8s-test--pod--1-eth0" May 17 00:51:13.365858 env[1476]: 2025-05-17 00:51:13.353 [INFO][3377] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="71dd448658b0f64121fc196fc23ae2a0b449416c1abd4b9a9237c917f0645e8d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.28-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.28-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"ce2b5bc8-a881-43e4-b8d6-8a9ebf540dc2", ResourceVersion:"1606", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 50, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.28", ContainerID:"71dd448658b0f64121fc196fc23ae2a0b449416c1abd4b9a9237c917f0645e8d", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.124.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"02:f7:05:4e:3d:43", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:51:13.365858 env[1476]: 2025-05-17 00:51:13.361 [INFO][3377] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="71dd448658b0f64121fc196fc23ae2a0b449416c1abd4b9a9237c917f0645e8d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.28-k8s-test--pod--1-eth0" May 17 00:51:13.373000 audit[3405]: NETFILTER_CFG table=filter:80 family=2 entries=40 op=nft_register_chain pid=3405 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:51:13.373000 audit[3405]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20336 a0=3 a1=fffff62fa980 a2=0 a3=ffffb99abfa8 items=0 ppid=2684 pid=3405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:13.373000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:51:13.381044 env[1476]: time="2025-05-17T00:51:13.380013755Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:51:13.381044 env[1476]: time="2025-05-17T00:51:13.380057714Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:51:13.381044 env[1476]: time="2025-05-17T00:51:13.380067954Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:51:13.381044 env[1476]: time="2025-05-17T00:51:13.380253029Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/71dd448658b0f64121fc196fc23ae2a0b449416c1abd4b9a9237c917f0645e8d pid=3414 runtime=io.containerd.runc.v2 May 17 00:51:13.393523 systemd[1]: Started cri-containerd-71dd448658b0f64121fc196fc23ae2a0b449416c1abd4b9a9237c917f0645e8d.scope. May 17 00:51:13.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.403000 audit: BPF prog-id=127 op=LOAD May 17 00:51:13.404000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.404000 audit[3424]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3414 pid=3424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:13.404000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731646434343836353862306636343132316663313936666332336165 May 17 00:51:13.404000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.404000 audit[3424]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3414 pid=3424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:13.404000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731646434343836353862306636343132316663313936666332336165 May 17 00:51:13.404000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.404000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.404000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.404000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.404000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.404000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.404000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.404000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.404000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.404000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.404000 audit: BPF prog-id=128 op=LOAD May 17 00:51:13.404000 audit[3424]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3414 pid=3424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:13.404000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731646434343836353862306636343132316663313936666332336165 May 17 00:51:13.405000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.405000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.405000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.405000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.405000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.405000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.405000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.405000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.405000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.405000 audit: BPF prog-id=129 op=LOAD May 17 00:51:13.405000 audit[3424]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3414 pid=3424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:13.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731646434343836353862306636343132316663313936666332336165 May 17 00:51:13.405000 audit: BPF prog-id=129 op=UNLOAD May 17 00:51:13.405000 audit: BPF prog-id=128 op=UNLOAD May 17 00:51:13.405000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.405000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.405000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.405000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.405000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.405000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.405000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.405000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.405000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.405000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.405000 audit: BPF prog-id=130 op=LOAD May 17 00:51:13.405000 audit[3424]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3414 pid=3424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:13.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731646434343836353862306636343132316663313936666332336165 May 17 00:51:13.424065 env[1476]: time="2025-05-17T00:51:13.424025666Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:ce2b5bc8-a881-43e4-b8d6-8a9ebf540dc2,Namespace:default,Attempt:0,} returns sandbox id \"71dd448658b0f64121fc196fc23ae2a0b449416c1abd4b9a9237c917f0645e8d\"" May 17 00:51:13.427171 env[1476]: time="2025-05-17T00:51:13.427137511Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 17 00:51:13.812258 env[1476]: time="2025-05-17T00:51:13.812202369Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:51:13.822345 env[1476]: time="2025-05-17T00:51:13.822303128Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:e8b1cb61bd96acc3ff3c695318c9cc691213d532eee3731d038af92816fcb5f4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:51:13.826865 env[1476]: time="2025-05-17T00:51:13.826836780Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:51:13.832039 env[1476]: time="2025-05-17T00:51:13.832014017Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:51:13.832726 env[1476]: time="2025-05-17T00:51:13.832696480Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:e8b1cb61bd96acc3ff3c695318c9cc691213d532eee3731d038af92816fcb5f4\"" May 17 00:51:13.835392 env[1476]: time="2025-05-17T00:51:13.835363937Z" level=info msg="CreateContainer within sandbox \"71dd448658b0f64121fc196fc23ae2a0b449416c1abd4b9a9237c917f0645e8d\" for container &ContainerMetadata{Name:test,Attempt:0,}" May 17 00:51:13.855606 kubelet[1921]: E0517 00:51:13.855568 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:51:13.882321 env[1476]: time="2025-05-17T00:51:13.882279458Z" level=info msg="CreateContainer within sandbox \"71dd448658b0f64121fc196fc23ae2a0b449416c1abd4b9a9237c917f0645e8d\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"6773b6118b89376a6918ee21dde8f8c81ec41ca9bc374b955c6b19892d11ac63\"" May 17 00:51:13.883063 env[1476]: time="2025-05-17T00:51:13.882889203Z" level=info msg="StartContainer for \"6773b6118b89376a6918ee21dde8f8c81ec41ca9bc374b955c6b19892d11ac63\"" May 17 00:51:13.898310 systemd[1]: Started cri-containerd-6773b6118b89376a6918ee21dde8f8c81ec41ca9bc374b955c6b19892d11ac63.scope. May 17 00:51:13.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.911000 audit: BPF prog-id=131 op=LOAD May 17 00:51:13.912000 audit[3455]: AVC avc: denied { bpf } for pid=3455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.912000 audit[3455]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3414 pid=3455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:13.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637373362363131386238393337366136393138656532316464653866 May 17 00:51:13.912000 audit[3455]: AVC avc: denied { perfmon } for pid=3455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.912000 audit[3455]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3414 pid=3455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:13.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637373362363131386238393337366136393138656532316464653866 May 17 00:51:13.912000 audit[3455]: AVC avc: denied { bpf } for pid=3455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.912000 audit[3455]: AVC avc: denied { bpf } for pid=3455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.912000 audit[3455]: AVC avc: denied { bpf } for pid=3455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.912000 audit[3455]: AVC avc: denied { perfmon } for pid=3455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.912000 audit[3455]: AVC avc: denied { perfmon } for pid=3455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.912000 audit[3455]: AVC avc: denied { perfmon } for pid=3455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.912000 audit[3455]: AVC avc: denied { perfmon } for pid=3455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.912000 audit[3455]: AVC avc: denied { perfmon } for pid=3455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.912000 audit[3455]: AVC avc: denied { bpf } for pid=3455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.912000 audit[3455]: AVC avc: denied { bpf } for pid=3455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.912000 audit: BPF prog-id=132 op=LOAD May 17 00:51:13.912000 audit[3455]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3414 pid=3455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:13.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637373362363131386238393337366136393138656532316464653866 May 17 00:51:13.913000 audit[3455]: AVC avc: denied { bpf } for pid=3455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.913000 audit[3455]: AVC avc: denied { bpf } for pid=3455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.913000 audit[3455]: AVC avc: denied { perfmon } for pid=3455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.913000 audit[3455]: AVC avc: denied { perfmon } for pid=3455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.913000 audit[3455]: AVC avc: denied { perfmon } for pid=3455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.913000 audit[3455]: AVC avc: denied { perfmon } for pid=3455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.913000 audit[3455]: AVC avc: denied { perfmon } for pid=3455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.913000 audit[3455]: AVC avc: denied { bpf } for pid=3455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.913000 audit[3455]: AVC avc: denied { bpf } for pid=3455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.913000 audit: BPF prog-id=133 op=LOAD May 17 00:51:13.913000 audit[3455]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3414 pid=3455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:13.913000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637373362363131386238393337366136393138656532316464653866 May 17 00:51:13.914000 audit: BPF prog-id=133 op=UNLOAD May 17 00:51:13.914000 audit: BPF prog-id=132 op=UNLOAD May 17 00:51:13.914000 audit[3455]: AVC avc: denied { bpf } for pid=3455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.914000 audit[3455]: AVC avc: denied { bpf } for pid=3455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.914000 audit[3455]: AVC avc: denied { bpf } for pid=3455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.914000 audit[3455]: AVC avc: denied { perfmon } for pid=3455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.914000 audit[3455]: AVC avc: denied { perfmon } for pid=3455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.914000 audit[3455]: AVC avc: denied { perfmon } for pid=3455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.914000 audit[3455]: AVC avc: denied { perfmon } for pid=3455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.914000 audit[3455]: AVC avc: denied { perfmon } for pid=3455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.914000 audit[3455]: AVC avc: denied { bpf } for pid=3455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.914000 audit[3455]: AVC avc: denied { bpf } for pid=3455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:13.914000 audit: BPF prog-id=134 op=LOAD May 17 00:51:13.914000 audit[3455]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3414 pid=3455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:13.914000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637373362363131386238393337366136393138656532316464653866 May 17 00:51:13.933362 env[1476]: time="2025-05-17T00:51:13.933313841Z" level=info msg="StartContainer for \"6773b6118b89376a6918ee21dde8f8c81ec41ca9bc374b955c6b19892d11ac63\" returns successfully" May 17 00:51:14.855867 kubelet[1921]: E0517 00:51:14.855825 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:51:15.190126 systemd-networkd[1629]: cali5ec59c6bf6e: Gained IPv6LL May 17 00:51:15.856243 kubelet[1921]: E0517 00:51:15.856205 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:51:16.856694 kubelet[1921]: E0517 00:51:16.856655 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:51:17.858059 kubelet[1921]: E0517 00:51:17.858019 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:51:18.858354 kubelet[1921]: E0517 00:51:18.858317 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:51:19.859061 kubelet[1921]: E0517 00:51:19.859028 1921 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"