May 17 00:50:06.064586 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] May 17 00:50:06.064605 kernel: Linux version 5.15.182-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri May 16 23:24:21 -00 2025 May 17 00:50:06.064613 kernel: earlycon: pl11 at MMIO 0x00000000effec000 (options '') May 17 00:50:06.064620 kernel: printk: bootconsole [pl11] enabled May 17 00:50:06.064625 kernel: efi: EFI v2.70 by EDK II May 17 00:50:06.064631 kernel: efi: ACPI 2.0=0x3fd5f018 SMBIOS=0x3e580000 SMBIOS 3.0=0x3e560000 MEMATTR=0x3ead8b98 RNG=0x3fd5f998 MEMRESERVE=0x3763cf98 May 17 00:50:06.064637 kernel: random: crng init done May 17 00:50:06.064643 kernel: ACPI: Early table checksum verification disabled May 17 00:50:06.064648 kernel: ACPI: RSDP 0x000000003FD5F018 000024 (v02 VRTUAL) May 17 00:50:06.064653 kernel: ACPI: XSDT 0x000000003FD5FF18 00006C (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:50:06.064659 kernel: ACPI: FACP 0x000000003FD5FC18 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:50:06.064664 kernel: ACPI: DSDT 0x000000003FD41018 01DFCD (v02 MSFTVM DSDT01 00000001 INTL 20230628) May 17 00:50:06.064671 kernel: ACPI: DBG2 0x000000003FD5FB18 000072 (v00 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:50:06.064677 kernel: ACPI: GTDT 0x000000003FD5FD98 000060 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:50:06.064684 kernel: ACPI: OEM0 0x000000003FD5F098 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:50:06.064689 kernel: ACPI: SPCR 0x000000003FD5FA98 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:50:06.064695 kernel: ACPI: APIC 0x000000003FD5F818 0000FC (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:50:06.064702 kernel: ACPI: SRAT 0x000000003FD5F198 000234 (v03 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:50:06.064708 kernel: ACPI: PPTT 0x000000003FD5F418 000120 (v01 VRTUAL MICROSFT 00000000 MSFT 00000000) May 17 00:50:06.064714 kernel: ACPI: BGRT 0x000000003FD5FE98 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:50:06.064719 kernel: ACPI: SPCR: console: pl011,mmio32,0xeffec000,115200 May 17 00:50:06.064725 kernel: NUMA: Failed to initialise from firmware May 17 00:50:06.064731 kernel: NUMA: Faking a node at [mem 0x0000000000000000-0x00000001bfffffff] May 17 00:50:06.064737 kernel: NUMA: NODE_DATA [mem 0x1bf7f3900-0x1bf7f8fff] May 17 00:50:06.064743 kernel: Zone ranges: May 17 00:50:06.064748 kernel: DMA [mem 0x0000000000000000-0x00000000ffffffff] May 17 00:50:06.064754 kernel: DMA32 empty May 17 00:50:06.064759 kernel: Normal [mem 0x0000000100000000-0x00000001bfffffff] May 17 00:50:06.064766 kernel: Movable zone start for each node May 17 00:50:06.064772 kernel: Early memory node ranges May 17 00:50:06.064778 kernel: node 0: [mem 0x0000000000000000-0x00000000007fffff] May 17 00:50:06.064784 kernel: node 0: [mem 0x0000000000824000-0x000000003e54ffff] May 17 00:50:06.064806 kernel: node 0: [mem 0x000000003e550000-0x000000003e87ffff] May 17 00:50:06.064812 kernel: node 0: [mem 0x000000003e880000-0x000000003fc7ffff] May 17 00:50:06.064818 kernel: node 0: [mem 0x000000003fc80000-0x000000003fcfffff] May 17 00:50:06.064823 kernel: node 0: [mem 0x000000003fd00000-0x000000003fffffff] May 17 00:50:06.064829 kernel: node 0: [mem 0x0000000100000000-0x00000001bfffffff] May 17 00:50:06.064835 kernel: Initmem setup node 0 [mem 0x0000000000000000-0x00000001bfffffff] May 17 00:50:06.064844 kernel: On node 0, zone DMA: 36 pages in unavailable ranges May 17 00:50:06.064850 kernel: psci: probing for conduit method from ACPI. May 17 00:50:06.064859 kernel: psci: PSCIv1.1 detected in firmware. May 17 00:50:06.064865 kernel: psci: Using standard PSCI v0.2 function IDs May 17 00:50:06.064871 kernel: psci: MIGRATE_INFO_TYPE not supported. May 17 00:50:06.064877 kernel: psci: SMC Calling Convention v1.4 May 17 00:50:06.064883 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x0 -> Node -1 May 17 00:50:06.064890 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1 -> Node -1 May 17 00:50:06.064896 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 May 17 00:50:06.064903 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 May 17 00:50:06.064909 kernel: pcpu-alloc: [0] 0 [0] 1 May 17 00:50:06.064915 kernel: Detected PIPT I-cache on CPU0 May 17 00:50:06.064921 kernel: CPU features: detected: GIC system register CPU interface May 17 00:50:06.064927 kernel: CPU features: detected: Hardware dirty bit management May 17 00:50:06.064933 kernel: CPU features: detected: Spectre-BHB May 17 00:50:06.064939 kernel: CPU features: kernel page table isolation forced ON by KASLR May 17 00:50:06.064945 kernel: CPU features: detected: Kernel page table isolation (KPTI) May 17 00:50:06.064952 kernel: CPU features: detected: ARM erratum 1418040 May 17 00:50:06.064959 kernel: CPU features: detected: ARM erratum 1542419 (kernel portion) May 17 00:50:06.064965 kernel: CPU features: detected: SSBS not fully self-synchronizing May 17 00:50:06.064971 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1032156 May 17 00:50:06.064977 kernel: Policy zone: Normal May 17 00:50:06.064985 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=2d48a3f066dcb37cd386b93b4921577cdf70daa76e7b097cf98da108968f8bb5 May 17 00:50:06.064991 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 17 00:50:06.064997 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 17 00:50:06.065004 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 17 00:50:06.065010 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 17 00:50:06.065016 kernel: software IO TLB: mapped [mem 0x000000003a550000-0x000000003e550000] (64MB) May 17 00:50:06.065023 kernel: Memory: 3986944K/4194160K available (9792K kernel code, 2094K rwdata, 7584K rodata, 36416K init, 777K bss, 207216K reserved, 0K cma-reserved) May 17 00:50:06.065031 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 May 17 00:50:06.065037 kernel: trace event string verifier disabled May 17 00:50:06.065043 kernel: rcu: Preemptible hierarchical RCU implementation. May 17 00:50:06.065050 kernel: rcu: RCU event tracing is enabled. May 17 00:50:06.065056 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. May 17 00:50:06.065063 kernel: Trampoline variant of Tasks RCU enabled. May 17 00:50:06.065069 kernel: Tracing variant of Tasks RCU enabled. May 17 00:50:06.065075 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 17 00:50:06.065081 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 May 17 00:50:06.065087 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 May 17 00:50:06.065093 kernel: GICv3: 960 SPIs implemented May 17 00:50:06.065100 kernel: GICv3: 0 Extended SPIs implemented May 17 00:50:06.065106 kernel: GICv3: Distributor has no Range Selector support May 17 00:50:06.065113 kernel: Root IRQ handler: gic_handle_irq May 17 00:50:06.065118 kernel: GICv3: 16 PPIs implemented May 17 00:50:06.065124 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000effee000 May 17 00:50:06.065130 kernel: ITS: No ITS available, not enabling LPIs May 17 00:50:06.065137 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 17 00:50:06.065143 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). May 17 00:50:06.065149 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns May 17 00:50:06.065155 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns May 17 00:50:06.065162 kernel: Console: colour dummy device 80x25 May 17 00:50:06.065169 kernel: printk: console [tty1] enabled May 17 00:50:06.065176 kernel: ACPI: Core revision 20210730 May 17 00:50:06.065182 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) May 17 00:50:06.065188 kernel: pid_max: default: 32768 minimum: 301 May 17 00:50:06.065194 kernel: LSM: Security Framework initializing May 17 00:50:06.065201 kernel: SELinux: Initializing. May 17 00:50:06.065207 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 17 00:50:06.065213 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 17 00:50:06.065220 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3a8030, hints 0xe, misc 0x31e1 May 17 00:50:06.065227 kernel: Hyper-V: Host Build 10.0.22477.1619-1-0 May 17 00:50:06.065233 kernel: rcu: Hierarchical SRCU implementation. May 17 00:50:06.065239 kernel: Remapping and enabling EFI services. May 17 00:50:06.065246 kernel: smp: Bringing up secondary CPUs ... May 17 00:50:06.065252 kernel: Detected PIPT I-cache on CPU1 May 17 00:50:06.065258 kernel: GICv3: CPU1: found redistributor 1 region 1:0x00000000f000e000 May 17 00:50:06.065264 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 17 00:50:06.065270 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] May 17 00:50:06.065277 kernel: smp: Brought up 1 node, 2 CPUs May 17 00:50:06.065283 kernel: SMP: Total of 2 processors activated. May 17 00:50:06.065290 kernel: CPU features: detected: 32-bit EL0 Support May 17 00:50:06.065297 kernel: CPU features: detected: Instruction cache invalidation not required for I/D coherence May 17 00:50:06.065303 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence May 17 00:50:06.065310 kernel: CPU features: detected: CRC32 instructions May 17 00:50:06.065316 kernel: CPU features: detected: RCpc load-acquire (LDAPR) May 17 00:50:06.065322 kernel: CPU features: detected: LSE atomic instructions May 17 00:50:06.065329 kernel: CPU features: detected: Privileged Access Never May 17 00:50:06.065335 kernel: CPU: All CPU(s) started at EL1 May 17 00:50:06.065341 kernel: alternatives: patching kernel code May 17 00:50:06.065349 kernel: devtmpfs: initialized May 17 00:50:06.065359 kernel: KASLR enabled May 17 00:50:06.065366 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 17 00:50:06.065374 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) May 17 00:50:06.065381 kernel: pinctrl core: initialized pinctrl subsystem May 17 00:50:06.065387 kernel: SMBIOS 3.1.0 present. May 17 00:50:06.065394 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 09/28/2024 May 17 00:50:06.065400 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 17 00:50:06.065407 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations May 17 00:50:06.065415 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations May 17 00:50:06.065422 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations May 17 00:50:06.065429 kernel: audit: initializing netlink subsys (disabled) May 17 00:50:06.065435 kernel: audit: type=2000 audit(0.092:1): state=initialized audit_enabled=0 res=1 May 17 00:50:06.065442 kernel: thermal_sys: Registered thermal governor 'step_wise' May 17 00:50:06.065448 kernel: cpuidle: using governor menu May 17 00:50:06.065455 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. May 17 00:50:06.065463 kernel: ASID allocator initialised with 32768 entries May 17 00:50:06.065469 kernel: ACPI: bus type PCI registered May 17 00:50:06.065476 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 17 00:50:06.065483 kernel: Serial: AMBA PL011 UART driver May 17 00:50:06.065489 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 17 00:50:06.065496 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages May 17 00:50:06.065502 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 17 00:50:06.065509 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages May 17 00:50:06.065515 kernel: cryptd: max_cpu_qlen set to 1000 May 17 00:50:06.065523 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) May 17 00:50:06.065530 kernel: ACPI: Added _OSI(Module Device) May 17 00:50:06.065537 kernel: ACPI: Added _OSI(Processor Device) May 17 00:50:06.065543 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 17 00:50:06.065550 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 17 00:50:06.065557 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 17 00:50:06.065563 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 17 00:50:06.065570 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 17 00:50:06.065576 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 17 00:50:06.065584 kernel: ACPI: Interpreter enabled May 17 00:50:06.065591 kernel: ACPI: Using GIC for interrupt routing May 17 00:50:06.065597 kernel: ARMH0011:00: ttyAMA0 at MMIO 0xeffec000 (irq = 12, base_baud = 0) is a SBSA May 17 00:50:06.065604 kernel: printk: console [ttyAMA0] enabled May 17 00:50:06.065611 kernel: printk: bootconsole [pl11] disabled May 17 00:50:06.065617 kernel: ARMH0011:01: ttyAMA1 at MMIO 0xeffeb000 (irq = 13, base_baud = 0) is a SBSA May 17 00:50:06.065624 kernel: iommu: Default domain type: Translated May 17 00:50:06.065630 kernel: iommu: DMA domain TLB invalidation policy: strict mode May 17 00:50:06.065637 kernel: vgaarb: loaded May 17 00:50:06.065643 kernel: pps_core: LinuxPPS API ver. 1 registered May 17 00:50:06.065652 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 17 00:50:06.065658 kernel: PTP clock support registered May 17 00:50:06.065665 kernel: Registered efivars operations May 17 00:50:06.065672 kernel: No ACPI PMU IRQ for CPU0 May 17 00:50:06.065679 kernel: No ACPI PMU IRQ for CPU1 May 17 00:50:06.065685 kernel: clocksource: Switched to clocksource arch_sys_counter May 17 00:50:06.065692 kernel: VFS: Disk quotas dquot_6.6.0 May 17 00:50:06.065699 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 17 00:50:06.065707 kernel: pnp: PnP ACPI init May 17 00:50:06.065714 kernel: pnp: PnP ACPI: found 0 devices May 17 00:50:06.065721 kernel: NET: Registered PF_INET protocol family May 17 00:50:06.065727 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 17 00:50:06.065734 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 17 00:50:06.065741 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 17 00:50:06.065748 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 17 00:50:06.065754 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 17 00:50:06.065761 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 17 00:50:06.065769 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 17 00:50:06.065776 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 17 00:50:06.065782 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 17 00:50:06.065797 kernel: PCI: CLS 0 bytes, default 64 May 17 00:50:06.065804 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 1 counters available May 17 00:50:06.065810 kernel: kvm [1]: HYP mode not available May 17 00:50:06.065817 kernel: Initialise system trusted keyrings May 17 00:50:06.065824 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 17 00:50:06.065830 kernel: Key type asymmetric registered May 17 00:50:06.065838 kernel: Asymmetric key parser 'x509' registered May 17 00:50:06.065845 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 17 00:50:06.065852 kernel: io scheduler mq-deadline registered May 17 00:50:06.065858 kernel: io scheduler kyber registered May 17 00:50:06.065865 kernel: io scheduler bfq registered May 17 00:50:06.065872 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 17 00:50:06.065878 kernel: thunder_xcv, ver 1.0 May 17 00:50:06.065885 kernel: thunder_bgx, ver 1.0 May 17 00:50:06.065891 kernel: nicpf, ver 1.0 May 17 00:50:06.065898 kernel: nicvf, ver 1.0 May 17 00:50:06.066028 kernel: rtc-efi rtc-efi.0: registered as rtc0 May 17 00:50:06.066089 kernel: rtc-efi rtc-efi.0: setting system clock to 2025-05-17T00:50:05 UTC (1747443005) May 17 00:50:06.066099 kernel: efifb: probing for efifb May 17 00:50:06.066106 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k May 17 00:50:06.066113 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 May 17 00:50:06.066119 kernel: efifb: scrolling: redraw May 17 00:50:06.066126 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 May 17 00:50:06.066134 kernel: Console: switching to colour frame buffer device 128x48 May 17 00:50:06.066141 kernel: fb0: EFI VGA frame buffer device May 17 00:50:06.066148 kernel: SMCCC: SOC_ID: ARCH_SOC_ID not implemented, skipping .... May 17 00:50:06.066154 kernel: hid: raw HID events driver (C) Jiri Kosina May 17 00:50:06.066161 kernel: NET: Registered PF_INET6 protocol family May 17 00:50:06.066168 kernel: Segment Routing with IPv6 May 17 00:50:06.066174 kernel: In-situ OAM (IOAM) with IPv6 May 17 00:50:06.066181 kernel: NET: Registered PF_PACKET protocol family May 17 00:50:06.066187 kernel: Key type dns_resolver registered May 17 00:50:06.066194 kernel: registered taskstats version 1 May 17 00:50:06.066202 kernel: Loading compiled-in X.509 certificates May 17 00:50:06.066208 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.182-flatcar: 2fa973ae674d09a62938b8c6a2b9446b5340adb7' May 17 00:50:06.066215 kernel: Key type .fscrypt registered May 17 00:50:06.066222 kernel: Key type fscrypt-provisioning registered May 17 00:50:06.066229 kernel: ima: No TPM chip found, activating TPM-bypass! May 17 00:50:06.066235 kernel: ima: Allocated hash algorithm: sha1 May 17 00:50:06.066242 kernel: ima: No architecture policies found May 17 00:50:06.066248 kernel: clk: Disabling unused clocks May 17 00:50:06.066256 kernel: Freeing unused kernel memory: 36416K May 17 00:50:06.066262 kernel: Run /init as init process May 17 00:50:06.066269 kernel: with arguments: May 17 00:50:06.066275 kernel: /init May 17 00:50:06.066282 kernel: with environment: May 17 00:50:06.066288 kernel: HOME=/ May 17 00:50:06.066295 kernel: TERM=linux May 17 00:50:06.066301 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 17 00:50:06.066310 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 00:50:06.066320 systemd[1]: Detected virtualization microsoft. May 17 00:50:06.066328 systemd[1]: Detected architecture arm64. May 17 00:50:06.066334 systemd[1]: Running in initrd. May 17 00:50:06.066341 systemd[1]: No hostname configured, using default hostname. May 17 00:50:06.066348 systemd[1]: Hostname set to . May 17 00:50:06.066356 systemd[1]: Initializing machine ID from random generator. May 17 00:50:06.066363 systemd[1]: Queued start job for default target initrd.target. May 17 00:50:06.066371 systemd[1]: Started systemd-ask-password-console.path. May 17 00:50:06.066378 systemd[1]: Reached target cryptsetup.target. May 17 00:50:06.066385 systemd[1]: Reached target paths.target. May 17 00:50:06.066392 systemd[1]: Reached target slices.target. May 17 00:50:06.066399 systemd[1]: Reached target swap.target. May 17 00:50:06.066406 systemd[1]: Reached target timers.target. May 17 00:50:06.066413 systemd[1]: Listening on iscsid.socket. May 17 00:50:06.066421 systemd[1]: Listening on iscsiuio.socket. May 17 00:50:06.066429 systemd[1]: Listening on systemd-journald-audit.socket. May 17 00:50:06.066436 systemd[1]: Listening on systemd-journald-dev-log.socket. May 17 00:50:06.066443 systemd[1]: Listening on systemd-journald.socket. May 17 00:50:06.066451 systemd[1]: Listening on systemd-networkd.socket. May 17 00:50:06.066458 systemd[1]: Listening on systemd-udevd-control.socket. May 17 00:50:06.066465 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 00:50:06.066472 systemd[1]: Reached target sockets.target. May 17 00:50:06.066479 systemd[1]: Starting kmod-static-nodes.service... May 17 00:50:06.066486 systemd[1]: Finished network-cleanup.service. May 17 00:50:06.066494 systemd[1]: Starting systemd-fsck-usr.service... May 17 00:50:06.066501 systemd[1]: Starting systemd-journald.service... May 17 00:50:06.066508 systemd[1]: Starting systemd-modules-load.service... May 17 00:50:06.066515 systemd[1]: Starting systemd-resolved.service... May 17 00:50:06.066522 systemd[1]: Starting systemd-vconsole-setup.service... May 17 00:50:06.066534 systemd-journald[276]: Journal started May 17 00:50:06.066573 systemd-journald[276]: Runtime Journal (/run/log/journal/638018a015f74fa8a86007c4d6ba2b94) is 8.0M, max 78.5M, 70.5M free. May 17 00:50:06.050760 systemd-modules-load[277]: Inserted module 'overlay' May 17 00:50:06.144063 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 17 00:50:06.144086 kernel: Bridge firewalling registered May 17 00:50:06.144107 systemd[1]: Started systemd-journald.service. May 17 00:50:06.144120 kernel: SCSI subsystem initialized May 17 00:50:06.144128 kernel: audit: type=1130 audit(1747443006.122:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:06.144138 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 17 00:50:06.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:06.087749 systemd-resolved[278]: Positive Trust Anchors: May 17 00:50:06.187893 kernel: device-mapper: uevent: version 1.0.3 May 17 00:50:06.187915 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 17 00:50:06.187925 kernel: audit: type=1130 audit(1747443006.170:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:06.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:06.087758 systemd-resolved[278]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 00:50:06.238877 kernel: audit: type=1130 audit(1747443006.193:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:06.238909 kernel: audit: type=1130 audit(1747443006.221:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:06.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:06.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:06.087785 systemd-resolved[278]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 00:50:06.314660 kernel: audit: type=1130 audit(1747443006.243:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:06.314689 kernel: audit: type=1130 audit(1747443006.295:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:06.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:06.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:06.090276 systemd-resolved[278]: Defaulting to hostname 'linux'. May 17 00:50:06.090284 systemd-modules-load[277]: Inserted module 'br_netfilter' May 17 00:50:06.139643 systemd[1]: Started systemd-resolved.service. May 17 00:50:06.187013 systemd-modules-load[277]: Inserted module 'dm_multipath' May 17 00:50:06.187046 systemd[1]: Finished kmod-static-nodes.service. May 17 00:50:06.194367 systemd[1]: Finished systemd-fsck-usr.service. May 17 00:50:06.222021 systemd[1]: Finished systemd-modules-load.service. May 17 00:50:06.243929 systemd[1]: Finished systemd-vconsole-setup.service. May 17 00:50:06.296368 systemd[1]: Reached target nss-lookup.target. May 17 00:50:06.404879 kernel: audit: type=1130 audit(1747443006.380:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:06.380000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:06.324183 systemd[1]: Starting dracut-cmdline-ask.service... May 17 00:50:06.434871 kernel: audit: type=1130 audit(1747443006.409:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:06.409000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:06.333867 systemd[1]: Starting systemd-sysctl.service... May 17 00:50:06.356037 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 17 00:50:06.464709 kernel: audit: type=1130 audit(1747443006.434:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:06.434000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:06.373429 systemd[1]: Finished systemd-sysctl.service. May 17 00:50:06.469281 dracut-cmdline[298]: dracut-dracut-053 May 17 00:50:06.469281 dracut-cmdline[298]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=t May 17 00:50:06.469281 dracut-cmdline[298]: tyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=2d48a3f066dcb37cd386b93b4921577cdf70daa76e7b097cf98da108968f8bb5 May 17 00:50:06.399942 systemd[1]: Finished dracut-cmdline-ask.service. May 17 00:50:06.409734 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 17 00:50:06.436026 systemd[1]: Starting dracut-cmdline.service... May 17 00:50:06.543809 kernel: Loading iSCSI transport class v2.0-870. May 17 00:50:06.559818 kernel: iscsi: registered transport (tcp) May 17 00:50:06.580873 kernel: iscsi: registered transport (qla4xxx) May 17 00:50:06.580935 kernel: QLogic iSCSI HBA Driver May 17 00:50:06.612167 systemd[1]: Finished dracut-cmdline.service. May 17 00:50:06.616000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:06.617989 systemd[1]: Starting dracut-pre-udev.service... May 17 00:50:06.671821 kernel: raid6: neonx8 gen() 13740 MB/s May 17 00:50:06.692799 kernel: raid6: neonx8 xor() 10836 MB/s May 17 00:50:06.712797 kernel: raid6: neonx4 gen() 13562 MB/s May 17 00:50:06.733801 kernel: raid6: neonx4 xor() 11064 MB/s May 17 00:50:06.754799 kernel: raid6: neonx2 gen() 12960 MB/s May 17 00:50:06.774796 kernel: raid6: neonx2 xor() 10249 MB/s May 17 00:50:06.795801 kernel: raid6: neonx1 gen() 10627 MB/s May 17 00:50:06.815801 kernel: raid6: neonx1 xor() 8809 MB/s May 17 00:50:06.835800 kernel: raid6: int64x8 gen() 6270 MB/s May 17 00:50:06.857804 kernel: raid6: int64x8 xor() 3545 MB/s May 17 00:50:06.878798 kernel: raid6: int64x4 gen() 7224 MB/s May 17 00:50:06.898801 kernel: raid6: int64x4 xor() 3843 MB/s May 17 00:50:06.920798 kernel: raid6: int64x2 gen() 6152 MB/s May 17 00:50:06.940823 kernel: raid6: int64x2 xor() 3320 MB/s May 17 00:50:06.961805 kernel: raid6: int64x1 gen() 5046 MB/s May 17 00:50:06.987657 kernel: raid6: int64x1 xor() 2644 MB/s May 17 00:50:06.987700 kernel: raid6: using algorithm neonx8 gen() 13740 MB/s May 17 00:50:06.987710 kernel: raid6: .... xor() 10836 MB/s, rmw enabled May 17 00:50:06.992044 kernel: raid6: using neon recovery algorithm May 17 00:50:07.013499 kernel: xor: measuring software checksum speed May 17 00:50:07.013556 kernel: 8regs : 17206 MB/sec May 17 00:50:07.017667 kernel: 32regs : 20702 MB/sec May 17 00:50:07.017800 kernel: arm64_neon : 25504 MB/sec May 17 00:50:07.026692 kernel: xor: using function: arm64_neon (25504 MB/sec) May 17 00:50:07.083824 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no May 17 00:50:07.095011 systemd[1]: Finished dracut-pre-udev.service. May 17 00:50:07.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:07.103000 audit: BPF prog-id=7 op=LOAD May 17 00:50:07.103000 audit: BPF prog-id=8 op=LOAD May 17 00:50:07.104821 systemd[1]: Starting systemd-udevd.service... May 17 00:50:07.119688 systemd-udevd[475]: Using default interface naming scheme 'v252'. May 17 00:50:07.125392 systemd[1]: Started systemd-udevd.service. May 17 00:50:07.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:07.137090 systemd[1]: Starting dracut-pre-trigger.service... May 17 00:50:07.156713 dracut-pre-trigger[496]: rd.md=0: removing MD RAID activation May 17 00:50:07.194632 systemd[1]: Finished dracut-pre-trigger.service. May 17 00:50:07.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:07.200323 systemd[1]: Starting systemd-udev-trigger.service... May 17 00:50:07.238125 systemd[1]: Finished systemd-udev-trigger.service. May 17 00:50:07.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:07.288810 kernel: hv_vmbus: Vmbus version:5.3 May 17 00:50:07.296816 kernel: hv_vmbus: registering driver hyperv_keyboard May 17 00:50:07.296865 kernel: hv_vmbus: registering driver hid_hyperv May 17 00:50:07.308815 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/MSFT1000:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 May 17 00:50:07.338572 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 May 17 00:50:07.338630 kernel: hid-generic 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on May 17 00:50:07.338779 kernel: hv_vmbus: registering driver hv_storvsc May 17 00:50:07.342813 kernel: hv_vmbus: registering driver hv_netvsc May 17 00:50:07.347810 kernel: scsi host1: storvsc_host_t May 17 00:50:07.347991 kernel: scsi host0: storvsc_host_t May 17 00:50:07.357942 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 May 17 00:50:07.364932 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 May 17 00:50:07.388803 kernel: sr 0:0:0:2: [sr0] scsi-1 drive May 17 00:50:07.390066 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 May 17 00:50:07.390079 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 May 17 00:50:07.404770 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) May 17 00:50:07.428021 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks May 17 00:50:07.428141 kernel: sd 0:0:0:0: [sda] Write Protect is off May 17 00:50:07.428269 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 May 17 00:50:07.428467 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA May 17 00:50:07.428642 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 00:50:07.428654 kernel: sd 0:0:0:0: [sda] Attached SCSI disk May 17 00:50:07.474762 kernel: hv_netvsc 000d3ac4-571f-000d-3ac4-571f000d3ac4 eth0: VF slot 1 added May 17 00:50:07.482819 kernel: hv_vmbus: registering driver hv_pci May 17 00:50:07.493425 kernel: hv_pci 7c7af61e-86a2-45b2-90b2-c986bd08a8d3: PCI VMBus probing: Using version 0x10004 May 17 00:50:07.788105 kernel: hv_pci 7c7af61e-86a2-45b2-90b2-c986bd08a8d3: PCI host bridge to bus 86a2:00 May 17 00:50:07.788224 kernel: pci_bus 86a2:00: root bus resource [mem 0xfc0000000-0xfc00fffff window] May 17 00:50:07.788320 kernel: pci_bus 86a2:00: No busn resource found for root bus, will use [bus 00-ff] May 17 00:50:07.788412 kernel: pci 86a2:00:02.0: [15b3:1018] type 00 class 0x020000 May 17 00:50:07.788516 kernel: pci 86a2:00:02.0: reg 0x10: [mem 0xfc0000000-0xfc00fffff 64bit pref] May 17 00:50:07.788602 kernel: pci 86a2:00:02.0: enabling Extended Tags May 17 00:50:07.788690 kernel: pci 86a2:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at 86a2:00:02.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) May 17 00:50:07.788770 kernel: pci_bus 86a2:00: busn_res: [bus 00-ff] end is updated to 00 May 17 00:50:07.788868 kernel: pci 86a2:00:02.0: BAR 0: assigned [mem 0xfc0000000-0xfc00fffff 64bit pref] May 17 00:50:07.827822 kernel: mlx5_core 86a2:00:02.0: firmware version: 16.31.2424 May 17 00:50:08.142282 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (528) May 17 00:50:08.142300 kernel: mlx5_core 86a2:00:02.0: MLX5E: StrdRq(1) RqSz(8) StrdSz(2048) RxCqeCmprss(0) May 17 00:50:08.142408 kernel: hv_netvsc 000d3ac4-571f-000d-3ac4-571f000d3ac4 eth0: VF registering: eth1 May 17 00:50:08.142498 kernel: mlx5_core 86a2:00:02.0 eth1: joined to eth0 May 17 00:50:07.921771 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 00:50:07.934835 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 17 00:50:08.161590 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 00:50:08.090846 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 17 00:50:08.099221 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 17 00:50:08.192959 kernel: mlx5_core 86a2:00:02.0 enP34466s1: renamed from eth1 May 17 00:50:08.111655 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 17 00:50:08.129344 systemd[1]: Starting disk-uuid.service... May 17 00:50:09.184815 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 00:50:09.186553 disk-uuid[598]: The operation has completed successfully. May 17 00:50:09.249255 systemd[1]: disk-uuid.service: Deactivated successfully. May 17 00:50:09.253000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:09.253000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:09.249354 systemd[1]: Finished disk-uuid.service. May 17 00:50:09.262734 systemd[1]: Starting verity-setup.service... May 17 00:50:09.305823 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" May 17 00:50:09.475203 systemd[1]: Found device dev-mapper-usr.device. May 17 00:50:09.486328 systemd[1]: Mounting sysusr-usr.mount... May 17 00:50:09.499128 systemd[1]: Finished verity-setup.service. May 17 00:50:09.507000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:09.564851 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 17 00:50:09.566592 systemd[1]: Mounted sysusr-usr.mount. May 17 00:50:09.575222 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 17 00:50:09.576579 systemd[1]: Starting ignition-setup.service... May 17 00:50:09.584400 systemd[1]: Starting parse-ip-for-networkd.service... May 17 00:50:09.627795 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm May 17 00:50:09.627859 kernel: BTRFS info (device sda6): using free space tree May 17 00:50:09.635213 kernel: BTRFS info (device sda6): has skinny extents May 17 00:50:09.723848 systemd[1]: mnt-oem.mount: Deactivated successfully. May 17 00:50:09.731612 systemd[1]: Finished parse-ip-for-networkd.service. May 17 00:50:09.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:09.740000 audit: BPF prog-id=9 op=LOAD May 17 00:50:09.741486 systemd[1]: Starting systemd-networkd.service... May 17 00:50:09.772275 systemd-networkd[847]: lo: Link UP May 17 00:50:09.772294 systemd-networkd[847]: lo: Gained carrier May 17 00:50:09.780000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:09.773029 systemd-networkd[847]: Enumeration completed May 17 00:50:09.775855 systemd[1]: Started systemd-networkd.service. May 17 00:50:09.781497 systemd[1]: Reached target network.target. May 17 00:50:09.789330 systemd-networkd[847]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 00:50:09.814000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:09.795341 systemd[1]: Starting iscsiuio.service... May 17 00:50:09.827487 iscsid[852]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 17 00:50:09.827487 iscsid[852]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log May 17 00:50:09.827487 iscsid[852]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 17 00:50:09.827487 iscsid[852]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 17 00:50:09.827487 iscsid[852]: If using hardware iscsi like qla4xxx this message can be ignored. May 17 00:50:09.827487 iscsid[852]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 17 00:50:09.827487 iscsid[852]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 17 00:50:09.843000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:09.894000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:09.806016 systemd[1]: Started iscsiuio.service. May 17 00:50:09.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:09.822106 systemd[1]: Starting iscsid.service... May 17 00:50:09.831148 systemd[1]: Started iscsid.service. May 17 00:50:09.863700 systemd[1]: Starting dracut-initqueue.service... May 17 00:50:09.993059 kernel: kauditd_printk_skb: 17 callbacks suppressed May 17 00:50:09.993091 kernel: audit: type=1130 audit(1747443009.966:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:09.966000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:09.884436 systemd[1]: Finished dracut-initqueue.service. May 17 00:50:09.895135 systemd[1]: Reached target remote-fs-pre.target. May 17 00:50:09.899994 systemd[1]: Reached target remote-cryptsetup.target. May 17 00:50:09.911636 systemd[1]: Reached target remote-fs.target. May 17 00:50:09.919911 systemd[1]: Starting dracut-pre-mount.service... May 17 00:50:09.929874 systemd[1]: Finished ignition-setup.service. May 17 00:50:09.944709 systemd[1]: Starting ignition-fetch-offline.service... May 17 00:50:09.959182 systemd[1]: Finished dracut-pre-mount.service. May 17 00:50:10.045809 kernel: mlx5_core 86a2:00:02.0 enP34466s1: Link up May 17 00:50:10.125836 kernel: hv_netvsc 000d3ac4-571f-000d-3ac4-571f000d3ac4 eth0: Data path switched to VF: enP34466s1 May 17 00:50:10.125991 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:50:10.131306 systemd-networkd[847]: enP34466s1: Link UP May 17 00:50:10.131444 systemd-networkd[847]: eth0: Link UP May 17 00:50:10.131813 systemd-networkd[847]: eth0: Gained carrier May 17 00:50:10.140032 systemd-networkd[847]: enP34466s1: Gained carrier May 17 00:50:10.155499 systemd-networkd[847]: eth0: DHCPv4 address 10.200.20.32/24, gateway 10.200.20.1 acquired from 168.63.129.16 May 17 00:50:11.432955 systemd-networkd[847]: eth0: Gained IPv6LL May 17 00:50:12.336520 ignition[868]: Ignition 2.14.0 May 17 00:50:12.336534 ignition[868]: Stage: fetch-offline May 17 00:50:12.336592 ignition[868]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:50:12.336618 ignition[868]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:50:12.370964 ignition[868]: no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:50:12.371113 ignition[868]: parsed url from cmdline: "" May 17 00:50:12.378135 systemd[1]: Finished ignition-fetch-offline.service. May 17 00:50:12.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:12.371119 ignition[868]: no config URL provided May 17 00:50:12.412253 kernel: audit: type=1130 audit(1747443012.383:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:12.384725 systemd[1]: Starting ignition-fetch.service... May 17 00:50:12.371124 ignition[868]: reading system config file "/usr/lib/ignition/user.ign" May 17 00:50:12.371132 ignition[868]: no config at "/usr/lib/ignition/user.ign" May 17 00:50:12.371138 ignition[868]: failed to fetch config: resource requires networking May 17 00:50:12.371614 ignition[868]: Ignition finished successfully May 17 00:50:12.412154 ignition[874]: Ignition 2.14.0 May 17 00:50:12.412160 ignition[874]: Stage: fetch May 17 00:50:12.412280 ignition[874]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:50:12.412300 ignition[874]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:50:12.424348 ignition[874]: no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:50:12.424493 ignition[874]: parsed url from cmdline: "" May 17 00:50:12.424497 ignition[874]: no config URL provided May 17 00:50:12.424502 ignition[874]: reading system config file "/usr/lib/ignition/user.ign" May 17 00:50:12.424510 ignition[874]: no config at "/usr/lib/ignition/user.ign" May 17 00:50:12.424542 ignition[874]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 May 17 00:50:12.511039 ignition[874]: GET result: OK May 17 00:50:12.513500 unknown[874]: fetched base config from "system" May 17 00:50:12.522000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:12.511106 ignition[874]: config has been read from IMDS userdata May 17 00:50:12.562340 kernel: audit: type=1130 audit(1747443012.522:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:12.513508 unknown[874]: fetched base config from "system" May 17 00:50:12.511124 ignition[874]: parsing config with SHA512: f14fad6423fcfcec8a24bd6170f2ae75e0d5707a4620687f02412b654dda79c468e48d84c9977808fe6b9e317cfa035cd8a6be56acec26789cabca19fddc2828 May 17 00:50:12.513513 unknown[874]: fetched user config from "azure" May 17 00:50:12.513913 ignition[874]: fetch: fetch complete May 17 00:50:12.517845 systemd[1]: Finished ignition-fetch.service. May 17 00:50:12.607709 kernel: audit: type=1130 audit(1747443012.579:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:12.579000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:12.513918 ignition[874]: fetch: fetch passed May 17 00:50:12.547187 systemd[1]: Starting ignition-kargs.service... May 17 00:50:12.513968 ignition[874]: Ignition finished successfully May 17 00:50:12.571633 systemd[1]: Finished ignition-kargs.service. May 17 00:50:12.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:12.564142 ignition[880]: Ignition 2.14.0 May 17 00:50:12.661912 kernel: audit: type=1130 audit(1747443012.621:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:12.581043 systemd[1]: Starting ignition-disks.service... May 17 00:50:12.564149 ignition[880]: Stage: kargs May 17 00:50:12.617151 systemd[1]: Finished ignition-disks.service. May 17 00:50:12.564274 ignition[880]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:50:12.622373 systemd[1]: Reached target initrd-root-device.target. May 17 00:50:12.564293 ignition[880]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:50:12.649607 systemd[1]: Reached target local-fs-pre.target. May 17 00:50:12.567275 ignition[880]: no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:50:12.658482 systemd[1]: Reached target local-fs.target. May 17 00:50:12.569314 ignition[880]: kargs: kargs passed May 17 00:50:12.666522 systemd[1]: Reached target sysinit.target. May 17 00:50:12.569375 ignition[880]: Ignition finished successfully May 17 00:50:12.676003 systemd[1]: Reached target basic.target. May 17 00:50:12.595508 ignition[886]: Ignition 2.14.0 May 17 00:50:12.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:12.789557 systemd-fsck[894]: ROOT: clean, 619/7326000 files, 481078/7359488 blocks May 17 00:50:12.796915 kernel: audit: type=1130 audit(1747443012.767:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:12.684758 systemd[1]: Starting systemd-fsck-root.service... May 17 00:50:12.595514 ignition[886]: Stage: disks May 17 00:50:12.763192 systemd[1]: Finished systemd-fsck-root.service. May 17 00:50:12.595646 ignition[886]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:50:12.769081 systemd[1]: Mounting sysroot.mount... May 17 00:50:12.595666 ignition[886]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:50:12.598745 ignition[886]: no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:50:12.849858 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 17 00:50:12.848064 systemd[1]: Mounted sysroot.mount. May 17 00:50:12.613955 ignition[886]: disks: disks passed May 17 00:50:12.852325 systemd[1]: Reached target initrd-root-fs.target. May 17 00:50:12.614010 ignition[886]: Ignition finished successfully May 17 00:50:12.895141 systemd[1]: Mounting sysroot-usr.mount... May 17 00:50:12.900570 systemd[1]: Starting flatcar-metadata-hostname.service... May 17 00:50:12.908506 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 17 00:50:12.908540 systemd[1]: Reached target ignition-diskful.target. May 17 00:50:12.914881 systemd[1]: Mounted sysroot-usr.mount. May 17 00:50:12.972878 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 17 00:50:12.978375 systemd[1]: Starting initrd-setup-root.service... May 17 00:50:13.003904 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (904) May 17 00:50:13.003954 initrd-setup-root[909]: cut: /sysroot/etc/passwd: No such file or directory May 17 00:50:13.022972 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm May 17 00:50:13.023038 kernel: BTRFS info (device sda6): using free space tree May 17 00:50:13.023049 kernel: BTRFS info (device sda6): has skinny extents May 17 00:50:13.032319 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 17 00:50:13.044045 initrd-setup-root[935]: cut: /sysroot/etc/group: No such file or directory May 17 00:50:13.067354 initrd-setup-root[943]: cut: /sysroot/etc/shadow: No such file or directory May 17 00:50:13.076637 initrd-setup-root[951]: cut: /sysroot/etc/gshadow: No such file or directory May 17 00:50:13.798231 systemd[1]: Finished initrd-setup-root.service. May 17 00:50:13.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:13.824191 systemd[1]: Starting ignition-mount.service... May 17 00:50:13.837266 kernel: audit: type=1130 audit(1747443013.802:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:13.834558 systemd[1]: Starting sysroot-boot.service... May 17 00:50:13.840085 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. May 17 00:50:13.840204 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. May 17 00:50:14.079944 systemd[1]: Finished sysroot-boot.service. May 17 00:50:14.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:14.106819 kernel: audit: type=1130 audit(1747443014.084:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:14.135131 ignition[974]: INFO : Ignition 2.14.0 May 17 00:50:14.135131 ignition[974]: INFO : Stage: mount May 17 00:50:14.149875 ignition[974]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:50:14.149875 ignition[974]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:50:14.149875 ignition[974]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:50:14.149875 ignition[974]: INFO : mount: mount passed May 17 00:50:14.149875 ignition[974]: INFO : Ignition finished successfully May 17 00:50:14.204320 kernel: audit: type=1130 audit(1747443014.149:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:14.149000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:14.145201 systemd[1]: Finished ignition-mount.service. May 17 00:50:15.972210 coreos-metadata[903]: May 17 00:50:15.972 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 May 17 00:50:15.986623 coreos-metadata[903]: May 17 00:50:15.975 INFO Fetch successful May 17 00:50:16.015986 coreos-metadata[903]: May 17 00:50:16.015 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 May 17 00:50:16.029171 coreos-metadata[903]: May 17 00:50:16.027 INFO Fetch successful May 17 00:50:16.252051 coreos-metadata[903]: May 17 00:50:16.251 INFO wrote hostname ci-3510.3.7-n-cf89ee32d5 to /sysroot/etc/hostname May 17 00:50:16.268622 systemd[1]: Finished flatcar-metadata-hostname.service. May 17 00:50:16.274000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:16.296507 systemd[1]: Starting ignition-files.service... May 17 00:50:16.306164 kernel: audit: type=1130 audit(1747443016.274:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:16.307174 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 17 00:50:16.328716 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (983) May 17 00:50:16.345513 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm May 17 00:50:16.345557 kernel: BTRFS info (device sda6): using free space tree May 17 00:50:16.345568 kernel: BTRFS info (device sda6): has skinny extents May 17 00:50:16.355514 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 17 00:50:16.372777 ignition[1002]: INFO : Ignition 2.14.0 May 17 00:50:16.378816 ignition[1002]: INFO : Stage: files May 17 00:50:16.378816 ignition[1002]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:50:16.378816 ignition[1002]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:50:16.403102 ignition[1002]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:50:16.582764 ignition[1002]: DEBUG : files: compiled without relabeling support, skipping May 17 00:50:16.589576 ignition[1002]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 17 00:50:16.589576 ignition[1002]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 17 00:50:16.644208 ignition[1002]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 17 00:50:16.654560 ignition[1002]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 17 00:50:16.662626 ignition[1002]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 17 00:50:16.662626 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" May 17 00:50:16.654597 unknown[1002]: wrote ssh authorized keys file for user: core May 17 00:50:16.690130 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" May 17 00:50:16.690130 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" May 17 00:50:16.690130 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 17 00:50:16.690130 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-arm64.raw" May 17 00:50:16.690130 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-arm64.raw" May 17 00:50:16.690130 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/etc/systemd/system/waagent.service" May 17 00:50:16.690130 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(6): oem config not found in "/usr/share/oem", looking on oem partition May 17 00:50:16.690130 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2602093414" May 17 00:50:16.690130 ignition[1002]: CRITICAL : files: createFilesystemsFiles: createFiles: op(6): op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2602093414": device or resource busy May 17 00:50:16.690130 ignition[1002]: ERROR : files: createFilesystemsFiles: createFiles: op(6): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2602093414", trying btrfs: device or resource busy May 17 00:50:16.690130 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2602093414" May 17 00:50:16.690130 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2602093414" May 17 00:50:16.690130 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [started] unmounting "/mnt/oem2602093414" May 17 00:50:16.847302 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [finished] unmounting "/mnt/oem2602093414" May 17 00:50:16.847302 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" May 17 00:50:16.847302 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" May 17 00:50:16.847302 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition May 17 00:50:16.847302 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2728565287" May 17 00:50:16.847302 ignition[1002]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2728565287": device or resource busy May 17 00:50:16.847302 ignition[1002]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2728565287", trying btrfs: device or resource busy May 17 00:50:16.847302 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2728565287" May 17 00:50:16.847302 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2728565287" May 17 00:50:16.847302 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem2728565287" May 17 00:50:16.847302 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem2728565287" May 17 00:50:16.847302 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" May 17 00:50:16.847302 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-arm64.raw" May 17 00:50:16.847302 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET https://extensions.flatcar.org/extensions/kubernetes-v1.33.0-arm64.raw: attempt #1 May 17 00:50:17.861077 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET result: OK May 17 00:50:18.098080 ignition[1002]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-arm64.raw" May 17 00:50:18.111829 ignition[1002]: INFO : files: op(f): [started] processing unit "waagent.service" May 17 00:50:18.111829 ignition[1002]: INFO : files: op(f): [finished] processing unit "waagent.service" May 17 00:50:18.111829 ignition[1002]: INFO : files: op(10): [started] processing unit "nvidia.service" May 17 00:50:18.111829 ignition[1002]: INFO : files: op(10): [finished] processing unit "nvidia.service" May 17 00:50:18.111829 ignition[1002]: INFO : files: op(11): [started] setting preset to enabled for "nvidia.service" May 17 00:50:18.111829 ignition[1002]: INFO : files: op(11): [finished] setting preset to enabled for "nvidia.service" May 17 00:50:18.111829 ignition[1002]: INFO : files: op(12): [started] setting preset to enabled for "waagent.service" May 17 00:50:18.111829 ignition[1002]: INFO : files: op(12): [finished] setting preset to enabled for "waagent.service" May 17 00:50:18.111829 ignition[1002]: INFO : files: createResultFile: createFiles: op(13): [started] writing file "/sysroot/etc/.ignition-result.json" May 17 00:50:18.111829 ignition[1002]: INFO : files: createResultFile: createFiles: op(13): [finished] writing file "/sysroot/etc/.ignition-result.json" May 17 00:50:18.111829 ignition[1002]: INFO : files: files passed May 17 00:50:18.111829 ignition[1002]: INFO : Ignition finished successfully May 17 00:50:18.282518 kernel: audit: type=1130 audit(1747443018.123:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:18.282546 kernel: audit: type=1130 audit(1747443018.175:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:18.282557 kernel: audit: type=1131 audit(1747443018.200:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:18.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:18.175000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:18.200000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:18.119329 systemd[1]: Finished ignition-files.service. May 17 00:50:18.288000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:18.127420 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 17 00:50:18.318494 initrd-setup-root-after-ignition[1027]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 17 00:50:18.332728 kernel: audit: type=1130 audit(1747443018.288:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:18.152354 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 17 00:50:18.153500 systemd[1]: Starting ignition-quench.service... May 17 00:50:18.171170 systemd[1]: ignition-quench.service: Deactivated successfully. May 17 00:50:18.171290 systemd[1]: Finished ignition-quench.service. May 17 00:50:18.277186 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 17 00:50:18.312175 systemd[1]: Reached target ignition-complete.target. May 17 00:50:18.374000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:18.332232 systemd[1]: Starting initrd-parse-etc.service... May 17 00:50:18.365661 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 17 00:50:18.365763 systemd[1]: Finished initrd-parse-etc.service. May 17 00:50:18.435631 kernel: audit: type=1130 audit(1747443018.374:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:18.435656 kernel: audit: type=1131 audit(1747443018.395:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:18.395000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:18.396995 systemd[1]: Reached target initrd-fs.target. May 17 00:50:18.405525 systemd[1]: Reached target initrd.target. May 17 00:50:18.433967 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 17 00:50:18.435513 systemd[1]: Starting dracut-pre-pivot.service... May 17 00:50:18.460000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:18.454724 systemd[1]: Finished dracut-pre-pivot.service. May 17 00:50:18.487867 kernel: audit: type=1130 audit(1747443018.460:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:18.487142 systemd[1]: Starting initrd-cleanup.service... May 17 00:50:18.501102 systemd[1]: Stopped target nss-lookup.target. May 17 00:50:18.506489 systemd[1]: Stopped target remote-cryptsetup.target. May 17 00:50:18.516825 systemd[1]: Stopped target timers.target. May 17 00:50:18.526374 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 17 00:50:18.535000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:18.526492 systemd[1]: Stopped dracut-pre-pivot.service. May 17 00:50:18.569663 kernel: audit: type=1131 audit(1747443018.535:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:18.558992 systemd[1]: Stopped target initrd.target. May 17 00:50:18.565343 systemd[1]: Stopped target basic.target. May 17 00:50:18.573890 systemd[1]: Stopped target ignition-complete.target. May 17 00:50:18.582943 systemd[1]: Stopped target ignition-diskful.target. May 17 00:50:18.591286 systemd[1]: Stopped target initrd-root-device.target. May 17 00:50:18.601521 systemd[1]: Stopped target remote-fs.target. May 17 00:50:18.610116 systemd[1]: Stopped target remote-fs-pre.target. May 17 00:50:18.619985 systemd[1]: Stopped target sysinit.target. May 17 00:50:18.628844 systemd[1]: Stopped target local-fs.target. May 17 00:50:18.637892 systemd[1]: Stopped target local-fs-pre.target. May 17 00:50:18.647053 systemd[1]: Stopped target swap.target. May 17 00:50:18.663000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:18.655127 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 17 00:50:18.692681 kernel: audit: type=1131 audit(1747443018.663:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:18.655300 systemd[1]: Stopped dracut-pre-mount.service. May 17 00:50:18.664404 systemd[1]: Stopped target cryptsetup.target. May 17 00:50:18.700000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:18.695971 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 17 00:50:18.710000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:18.696092 systemd[1]: Stopped dracut-initqueue.service. May 17 00:50:18.721000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:18.701382 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 17 00:50:18.731000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:18.701482 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 17 00:50:18.710993 systemd[1]: ignition-files.service: Deactivated successfully. May 17 00:50:18.763308 ignition[1040]: INFO : Ignition 2.14.0 May 17 00:50:18.763308 ignition[1040]: INFO : Stage: umount May 17 00:50:18.763308 ignition[1040]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:50:18.763308 ignition[1040]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:50:18.773000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:18.783000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:18.791000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:18.802000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:18.711083 systemd[1]: Stopped ignition-files.service. May 17 00:50:18.820000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:18.825126 ignition[1040]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:50:18.825126 ignition[1040]: INFO : umount: umount passed May 17 00:50:18.825126 ignition[1040]: INFO : Ignition finished successfully May 17 00:50:18.829000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:18.841000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:18.721881 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. May 17 00:50:18.860000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:18.721977 systemd[1]: Stopped flatcar-metadata-hostname.service. May 17 00:50:18.733102 systemd[1]: Stopping ignition-mount.service... May 17 00:50:18.752036 systemd[1]: Stopping iscsiuio.service... May 17 00:50:18.761452 systemd[1]: Stopping sysroot-boot.service... May 17 00:50:18.768063 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 17 00:50:18.768235 systemd[1]: Stopped systemd-udev-trigger.service. May 17 00:50:18.776183 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 17 00:50:18.776320 systemd[1]: Stopped dracut-pre-trigger.service. May 17 00:50:18.786438 systemd[1]: iscsiuio.service: Deactivated successfully. May 17 00:50:18.936000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:18.786556 systemd[1]: Stopped iscsiuio.service. May 17 00:50:18.792588 systemd[1]: ignition-mount.service: Deactivated successfully. May 17 00:50:18.792682 systemd[1]: Stopped ignition-mount.service. May 17 00:50:18.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:18.964000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:18.804866 systemd[1]: ignition-disks.service: Deactivated successfully. May 17 00:50:18.974000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:18.804939 systemd[1]: Stopped ignition-disks.service. May 17 00:50:18.983000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:18.983000 audit: BPF prog-id=6 op=UNLOAD May 17 00:50:18.820995 systemd[1]: ignition-kargs.service: Deactivated successfully. May 17 00:50:18.821050 systemd[1]: Stopped ignition-kargs.service. May 17 00:50:19.006000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:18.829782 systemd[1]: ignition-fetch.service: Deactivated successfully. May 17 00:50:19.016000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:18.829839 systemd[1]: Stopped ignition-fetch.service. May 17 00:50:19.027000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:18.841662 systemd[1]: Stopped target network.target. May 17 00:50:18.850802 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 17 00:50:18.850860 systemd[1]: Stopped ignition-fetch-offline.service. May 17 00:50:18.861330 systemd[1]: Stopped target paths.target. May 17 00:50:18.872102 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 17 00:50:19.063000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:18.881883 systemd[1]: Stopped systemd-ask-password-console.path. May 17 00:50:18.890307 systemd[1]: Stopped target slices.target. May 17 00:50:18.898903 systemd[1]: Stopped target sockets.target. May 17 00:50:19.093000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:18.909127 systemd[1]: iscsid.socket: Deactivated successfully. May 17 00:50:19.102000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:18.909164 systemd[1]: Closed iscsid.socket. May 17 00:50:19.112000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:18.917829 systemd[1]: iscsiuio.socket: Deactivated successfully. May 17 00:50:18.917874 systemd[1]: Closed iscsiuio.socket. May 17 00:50:18.927950 systemd[1]: ignition-setup.service: Deactivated successfully. May 17 00:50:18.927996 systemd[1]: Stopped ignition-setup.service. May 17 00:50:19.154896 kernel: hv_netvsc 000d3ac4-571f-000d-3ac4-571f000d3ac4 eth0: Data path switched from VF: enP34466s1 May 17 00:50:19.149000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:18.937355 systemd[1]: Stopping systemd-networkd.service... May 17 00:50:19.158000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:18.946737 systemd[1]: Stopping systemd-resolved.service... May 17 00:50:19.168000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:18.954855 systemd-networkd[847]: eth0: DHCPv6 lease lost May 17 00:50:19.173000 audit: BPF prog-id=9 op=UNLOAD May 17 00:50:19.178000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:19.178000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:18.955825 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 17 00:50:18.955941 systemd[1]: Finished initrd-cleanup.service. May 17 00:50:18.966067 systemd[1]: systemd-resolved.service: Deactivated successfully. May 17 00:50:18.966190 systemd[1]: Stopped systemd-resolved.service. May 17 00:50:18.974736 systemd[1]: systemd-networkd.service: Deactivated successfully. May 17 00:50:18.974885 systemd[1]: Stopped systemd-networkd.service. May 17 00:50:18.984421 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 17 00:50:18.984463 systemd[1]: Closed systemd-networkd.socket. May 17 00:50:18.993489 systemd[1]: Stopping network-cleanup.service... May 17 00:50:19.002237 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 17 00:50:19.002321 systemd[1]: Stopped parse-ip-for-networkd.service. May 17 00:50:19.007717 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 17 00:50:19.007777 systemd[1]: Stopped systemd-sysctl.service. May 17 00:50:19.022172 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 17 00:50:19.022230 systemd[1]: Stopped systemd-modules-load.service. May 17 00:50:19.027561 systemd[1]: Stopping systemd-udevd.service... May 17 00:50:19.045580 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 17 00:50:19.055413 systemd[1]: systemd-udevd.service: Deactivated successfully. May 17 00:50:19.055581 systemd[1]: Stopped systemd-udevd.service. May 17 00:50:19.064551 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 17 00:50:19.064595 systemd[1]: Closed systemd-udevd-control.socket. May 17 00:50:19.075198 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 17 00:50:19.075280 systemd[1]: Closed systemd-udevd-kernel.socket. May 17 00:50:19.084978 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 17 00:50:19.307000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:19.085041 systemd[1]: Stopped dracut-pre-udev.service. May 17 00:50:19.093578 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 17 00:50:19.093625 systemd[1]: Stopped dracut-cmdline.service. May 17 00:50:19.102451 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 17 00:50:19.102497 systemd[1]: Stopped dracut-cmdline-ask.service. May 17 00:50:19.116386 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 17 00:50:19.131077 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. May 17 00:50:19.131143 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. May 17 00:50:19.153918 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 17 00:50:19.153970 systemd[1]: Stopped kmod-static-nodes.service. May 17 00:50:19.158878 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 17 00:50:19.158924 systemd[1]: Stopped systemd-vconsole-setup.service. May 17 00:50:19.169934 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. May 17 00:50:19.170458 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 17 00:50:19.170538 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 17 00:50:19.299472 systemd[1]: network-cleanup.service: Deactivated successfully. May 17 00:50:19.299584 systemd[1]: Stopped network-cleanup.service. May 17 00:50:19.586978 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 17 00:50:19.596198 systemd[1]: sysroot-boot.service: Deactivated successfully. May 17 00:50:19.596334 systemd[1]: Stopped sysroot-boot.service. May 17 00:50:19.606000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:19.606593 systemd[1]: Reached target initrd-switch-root.target. May 17 00:50:19.617078 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 17 00:50:19.626000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:19.617173 systemd[1]: Stopped initrd-setup-root.service. May 17 00:50:19.628155 systemd[1]: Starting initrd-switch-root.service... May 17 00:50:19.651005 systemd[1]: Switching root. May 17 00:50:19.677072 iscsid[852]: iscsid shutting down. May 17 00:50:19.683211 systemd-journald[276]: Received SIGTERM from PID 1 (n/a). May 17 00:50:19.683274 systemd-journald[276]: Journal stopped May 17 00:50:41.081085 kernel: SELinux: Class mctp_socket not defined in policy. May 17 00:50:41.081108 kernel: SELinux: Class anon_inode not defined in policy. May 17 00:50:41.081119 kernel: SELinux: the above unknown classes and permissions will be allowed May 17 00:50:41.081129 kernel: SELinux: policy capability network_peer_controls=1 May 17 00:50:41.081138 kernel: SELinux: policy capability open_perms=1 May 17 00:50:41.081146 kernel: SELinux: policy capability extended_socket_class=1 May 17 00:50:41.081155 kernel: SELinux: policy capability always_check_network=0 May 17 00:50:41.081165 kernel: SELinux: policy capability cgroup_seclabel=1 May 17 00:50:41.081173 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 17 00:50:41.081182 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 17 00:50:41.081190 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 17 00:50:41.081200 kernel: kauditd_printk_skb: 34 callbacks suppressed May 17 00:50:41.081208 kernel: audit: type=1403 audit(1747443021.738:81): auid=4294967295 ses=4294967295 lsm=selinux res=1 May 17 00:50:41.081219 systemd[1]: Successfully loaded SELinux policy in 248.490ms. May 17 00:50:41.081229 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 23.803ms. May 17 00:50:41.081241 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 00:50:41.081251 systemd[1]: Detected virtualization microsoft. May 17 00:50:41.081260 systemd[1]: Detected architecture arm64. May 17 00:50:41.081268 systemd[1]: Detected first boot. May 17 00:50:41.081278 systemd[1]: Hostname set to . May 17 00:50:41.081287 systemd[1]: Initializing machine ID from random generator. May 17 00:50:41.081296 kernel: audit: type=1400 audit(1747443022.422:82): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:50:41.081307 kernel: audit: type=1400 audit(1747443022.422:83): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:50:41.081316 kernel: audit: type=1334 audit(1747443022.441:84): prog-id=10 op=LOAD May 17 00:50:41.081324 kernel: audit: type=1334 audit(1747443022.441:85): prog-id=10 op=UNLOAD May 17 00:50:41.081333 kernel: audit: type=1334 audit(1747443022.458:86): prog-id=11 op=LOAD May 17 00:50:41.081341 kernel: audit: type=1334 audit(1747443022.458:87): prog-id=11 op=UNLOAD May 17 00:50:41.081350 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 17 00:50:41.081361 kernel: audit: type=1400 audit(1747443023.743:88): avc: denied { associate } for pid=1073 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 17 00:50:41.081372 kernel: audit: type=1300 audit(1747443023.743:88): arch=c00000b7 syscall=5 success=yes exit=0 a0=400014588c a1=40000c6df8 a2=40000cd0c0 a3=32 items=0 ppid=1056 pid=1073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:41.081381 kernel: audit: type=1327 audit(1747443023.743:88): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:50:41.081390 systemd[1]: Populated /etc with preset unit settings. May 17 00:50:41.081400 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:50:41.081410 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:50:41.081420 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:50:41.081430 kernel: kauditd_printk_skb: 6 callbacks suppressed May 17 00:50:41.081439 kernel: audit: type=1334 audit(1747443040.216:90): prog-id=12 op=LOAD May 17 00:50:41.081447 kernel: audit: type=1334 audit(1747443040.216:91): prog-id=3 op=UNLOAD May 17 00:50:41.081456 kernel: audit: type=1334 audit(1747443040.223:92): prog-id=13 op=LOAD May 17 00:50:41.081465 kernel: audit: type=1334 audit(1747443040.230:93): prog-id=14 op=LOAD May 17 00:50:41.081475 kernel: audit: type=1334 audit(1747443040.230:94): prog-id=4 op=UNLOAD May 17 00:50:41.081484 kernel: audit: type=1334 audit(1747443040.230:95): prog-id=5 op=UNLOAD May 17 00:50:41.081493 kernel: audit: type=1334 audit(1747443040.236:96): prog-id=15 op=LOAD May 17 00:50:41.081506 kernel: audit: type=1334 audit(1747443040.236:97): prog-id=12 op=UNLOAD May 17 00:50:41.081516 systemd[1]: iscsid.service: Deactivated successfully. May 17 00:50:41.081525 kernel: audit: type=1334 audit(1747443040.242:98): prog-id=16 op=LOAD May 17 00:50:41.081534 systemd[1]: Stopped iscsid.service. May 17 00:50:41.081544 kernel: audit: type=1334 audit(1747443040.248:99): prog-id=17 op=LOAD May 17 00:50:41.081553 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 17 00:50:41.081563 systemd[1]: Stopped initrd-switch-root.service. May 17 00:50:41.081573 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 17 00:50:41.081584 systemd[1]: Created slice system-addon\x2dconfig.slice. May 17 00:50:41.081595 systemd[1]: Created slice system-addon\x2drun.slice. May 17 00:50:41.081605 systemd[1]: Created slice system-getty.slice. May 17 00:50:41.081614 systemd[1]: Created slice system-modprobe.slice. May 17 00:50:41.081624 systemd[1]: Created slice system-serial\x2dgetty.slice. May 17 00:50:41.081634 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 17 00:50:41.081643 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 17 00:50:41.081653 systemd[1]: Created slice user.slice. May 17 00:50:41.081663 systemd[1]: Started systemd-ask-password-console.path. May 17 00:50:41.081673 systemd[1]: Started systemd-ask-password-wall.path. May 17 00:50:41.081683 systemd[1]: Set up automount boot.automount. May 17 00:50:41.081692 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 17 00:50:41.081702 systemd[1]: Stopped target initrd-switch-root.target. May 17 00:50:41.081711 systemd[1]: Stopped target initrd-fs.target. May 17 00:50:41.081721 systemd[1]: Stopped target initrd-root-fs.target. May 17 00:50:41.081730 systemd[1]: Reached target integritysetup.target. May 17 00:50:41.081739 systemd[1]: Reached target remote-cryptsetup.target. May 17 00:50:41.081750 systemd[1]: Reached target remote-fs.target. May 17 00:50:41.081760 systemd[1]: Reached target slices.target. May 17 00:50:41.081770 systemd[1]: Reached target swap.target. May 17 00:50:41.081779 systemd[1]: Reached target torcx.target. May 17 00:50:41.081825 systemd[1]: Reached target veritysetup.target. May 17 00:50:41.081837 systemd[1]: Listening on systemd-coredump.socket. May 17 00:50:41.081849 systemd[1]: Listening on systemd-initctl.socket. May 17 00:50:41.081859 systemd[1]: Listening on systemd-networkd.socket. May 17 00:50:41.081868 systemd[1]: Listening on systemd-udevd-control.socket. May 17 00:50:41.081878 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 00:50:41.081887 systemd[1]: Listening on systemd-userdbd.socket. May 17 00:50:41.081897 systemd[1]: Mounting dev-hugepages.mount... May 17 00:50:41.081906 systemd[1]: Mounting dev-mqueue.mount... May 17 00:50:41.081916 systemd[1]: Mounting media.mount... May 17 00:50:41.081927 systemd[1]: Mounting sys-kernel-debug.mount... May 17 00:50:41.081936 systemd[1]: Mounting sys-kernel-tracing.mount... May 17 00:50:41.081945 systemd[1]: Mounting tmp.mount... May 17 00:50:41.081955 systemd[1]: Starting flatcar-tmpfiles.service... May 17 00:50:41.081968 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:50:41.082014 systemd[1]: Starting kmod-static-nodes.service... May 17 00:50:41.082059 systemd[1]: Starting modprobe@configfs.service... May 17 00:50:41.082069 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:50:41.082118 systemd[1]: Starting modprobe@drm.service... May 17 00:50:41.082152 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:50:41.082201 systemd[1]: Starting modprobe@fuse.service... May 17 00:50:41.082252 systemd[1]: Starting modprobe@loop.service... May 17 00:50:41.082299 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 17 00:50:41.082331 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 17 00:50:41.082350 systemd[1]: Stopped systemd-fsck-root.service. May 17 00:50:41.082377 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 17 00:50:41.082405 systemd[1]: Stopped systemd-fsck-usr.service. May 17 00:50:41.082433 systemd[1]: Stopped systemd-journald.service. May 17 00:50:41.082451 systemd[1]: systemd-journald.service: Consumed 3.230s CPU time. May 17 00:50:41.082462 systemd[1]: Starting systemd-journald.service... May 17 00:50:41.082475 systemd[1]: Starting systemd-modules-load.service... May 17 00:50:41.082488 systemd[1]: Starting systemd-network-generator.service... May 17 00:50:41.082500 systemd[1]: Starting systemd-remount-fs.service... May 17 00:50:41.082514 systemd[1]: Starting systemd-udev-trigger.service... May 17 00:50:41.082525 systemd[1]: verity-setup.service: Deactivated successfully. May 17 00:50:41.082537 systemd[1]: Stopped verity-setup.service. May 17 00:50:41.082549 systemd[1]: Mounted dev-hugepages.mount. May 17 00:50:41.082559 kernel: loop: module loaded May 17 00:50:41.082575 systemd-journald[1151]: Journal started May 17 00:50:41.082626 systemd-journald[1151]: Runtime Journal (/run/log/journal/04cbe832a05344928fc282076cc65031) is 8.0M, max 78.5M, 70.5M free. May 17 00:50:21.738000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 17 00:50:22.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:50:22.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:50:22.441000 audit: BPF prog-id=10 op=LOAD May 17 00:50:22.441000 audit: BPF prog-id=10 op=UNLOAD May 17 00:50:22.458000 audit: BPF prog-id=11 op=LOAD May 17 00:50:22.458000 audit: BPF prog-id=11 op=UNLOAD May 17 00:50:23.743000 audit[1073]: AVC avc: denied { associate } for pid=1073 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 17 00:50:23.743000 audit[1073]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=400014588c a1=40000c6df8 a2=40000cd0c0 a3=32 items=0 ppid=1056 pid=1073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:23.743000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:50:23.756000 audit[1073]: AVC avc: denied { associate } for pid=1073 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 17 00:50:23.756000 audit[1073]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145965 a2=1ed a3=0 items=2 ppid=1056 pid=1073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:23.756000 audit: CWD cwd="/" May 17 00:50:23.756000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:50:23.756000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:50:23.756000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:50:40.216000 audit: BPF prog-id=12 op=LOAD May 17 00:50:40.216000 audit: BPF prog-id=3 op=UNLOAD May 17 00:50:40.223000 audit: BPF prog-id=13 op=LOAD May 17 00:50:40.230000 audit: BPF prog-id=14 op=LOAD May 17 00:50:40.230000 audit: BPF prog-id=4 op=UNLOAD May 17 00:50:40.230000 audit: BPF prog-id=5 op=UNLOAD May 17 00:50:40.236000 audit: BPF prog-id=15 op=LOAD May 17 00:50:40.236000 audit: BPF prog-id=12 op=UNLOAD May 17 00:50:40.242000 audit: BPF prog-id=16 op=LOAD May 17 00:50:40.248000 audit: BPF prog-id=17 op=LOAD May 17 00:50:40.248000 audit: BPF prog-id=13 op=UNLOAD May 17 00:50:40.248000 audit: BPF prog-id=14 op=UNLOAD May 17 00:50:40.254000 audit: BPF prog-id=18 op=LOAD May 17 00:50:40.254000 audit: BPF prog-id=15 op=UNLOAD May 17 00:50:40.260000 audit: BPF prog-id=19 op=LOAD May 17 00:50:40.266000 audit: BPF prog-id=20 op=LOAD May 17 00:50:40.266000 audit: BPF prog-id=16 op=UNLOAD May 17 00:50:40.266000 audit: BPF prog-id=17 op=UNLOAD May 17 00:50:40.267000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:40.302000 audit: BPF prog-id=18 op=UNLOAD May 17 00:50:40.302000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:40.319000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:40.319000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:40.824000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:40.840000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:40.851000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:40.851000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:40.859000 audit: BPF prog-id=21 op=LOAD May 17 00:50:40.859000 audit: BPF prog-id=22 op=LOAD May 17 00:50:40.859000 audit: BPF prog-id=23 op=LOAD May 17 00:50:40.859000 audit: BPF prog-id=19 op=UNLOAD May 17 00:50:40.859000 audit: BPF prog-id=20 op=UNLOAD May 17 00:50:41.060000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:41.078000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 17 00:50:41.078000 audit[1151]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=6 a1=ffffca061840 a2=4000 a3=1 items=0 ppid=1 pid=1151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:41.078000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 17 00:50:23.531908 /usr/lib/systemd/system-generators/torcx-generator[1073]: time="2025-05-17T00:50:23Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:50:40.215701 systemd[1]: Queued start job for default target multi-user.target. May 17 00:50:23.532246 /usr/lib/systemd/system-generators/torcx-generator[1073]: time="2025-05-17T00:50:23Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 17 00:50:40.215715 systemd[1]: Unnecessary job was removed for dev-sda6.device. May 17 00:50:23.532274 /usr/lib/systemd/system-generators/torcx-generator[1073]: time="2025-05-17T00:50:23Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 17 00:50:40.268311 systemd[1]: systemd-journald.service: Deactivated successfully. May 17 00:50:41.086868 systemd[1]: Started systemd-journald.service. May 17 00:50:23.532315 /usr/lib/systemd/system-generators/torcx-generator[1073]: time="2025-05-17T00:50:23Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 17 00:50:40.268711 systemd[1]: systemd-journald.service: Consumed 3.230s CPU time. May 17 00:50:23.532325 /usr/lib/systemd/system-generators/torcx-generator[1073]: time="2025-05-17T00:50:23Z" level=debug msg="skipped missing lower profile" missing profile=oem May 17 00:50:23.532366 /usr/lib/systemd/system-generators/torcx-generator[1073]: time="2025-05-17T00:50:23Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 17 00:50:23.532378 /usr/lib/systemd/system-generators/torcx-generator[1073]: time="2025-05-17T00:50:23Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 17 00:50:23.532593 /usr/lib/systemd/system-generators/torcx-generator[1073]: time="2025-05-17T00:50:23Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 17 00:50:23.532628 /usr/lib/systemd/system-generators/torcx-generator[1073]: time="2025-05-17T00:50:23Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 17 00:50:23.532640 /usr/lib/systemd/system-generators/torcx-generator[1073]: time="2025-05-17T00:50:23Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 17 00:50:23.709112 /usr/lib/systemd/system-generators/torcx-generator[1073]: time="2025-05-17T00:50:23Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 17 00:50:23.709174 /usr/lib/systemd/system-generators/torcx-generator[1073]: time="2025-05-17T00:50:23Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 17 00:50:23.709198 /usr/lib/systemd/system-generators/torcx-generator[1073]: time="2025-05-17T00:50:23Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 17 00:50:23.709215 /usr/lib/systemd/system-generators/torcx-generator[1073]: time="2025-05-17T00:50:23Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 17 00:50:23.709240 /usr/lib/systemd/system-generators/torcx-generator[1073]: time="2025-05-17T00:50:23Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 17 00:50:23.709253 /usr/lib/systemd/system-generators/torcx-generator[1073]: time="2025-05-17T00:50:23Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 17 00:50:38.286970 /usr/lib/systemd/system-generators/torcx-generator[1073]: time="2025-05-17T00:50:38Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:50:38.287291 /usr/lib/systemd/system-generators/torcx-generator[1073]: time="2025-05-17T00:50:38Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:50:38.287413 /usr/lib/systemd/system-generators/torcx-generator[1073]: time="2025-05-17T00:50:38Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:50:38.287607 /usr/lib/systemd/system-generators/torcx-generator[1073]: time="2025-05-17T00:50:38Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:50:38.287673 /usr/lib/systemd/system-generators/torcx-generator[1073]: time="2025-05-17T00:50:38Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 17 00:50:38.287745 /usr/lib/systemd/system-generators/torcx-generator[1073]: time="2025-05-17T00:50:38Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 17 00:50:41.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:41.096077 systemd[1]: Mounted dev-mqueue.mount. May 17 00:50:41.100341 systemd[1]: Mounted media.mount. May 17 00:50:41.104473 systemd[1]: Mounted sys-kernel-debug.mount. May 17 00:50:41.109151 systemd[1]: Mounted sys-kernel-tracing.mount. May 17 00:50:41.114592 systemd[1]: Mounted tmp.mount. May 17 00:50:41.119389 systemd[1]: Finished flatcar-tmpfiles.service. May 17 00:50:41.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:41.125430 systemd[1]: Finished kmod-static-nodes.service. May 17 00:50:41.129000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:41.130918 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:50:41.131145 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:50:41.135000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:41.135000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:41.136370 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 00:50:41.136508 systemd[1]: Finished modprobe@drm.service. May 17 00:50:41.140000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:41.140000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:41.141572 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:50:41.141710 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:50:41.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:41.146000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:41.147782 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:50:41.147932 systemd[1]: Finished modprobe@loop.service. May 17 00:50:41.152000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:41.152000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:41.153398 systemd[1]: Finished systemd-network-generator.service. May 17 00:50:41.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:41.159520 systemd[1]: Finished systemd-remount-fs.service. May 17 00:50:41.163000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:41.165104 systemd[1]: Reached target network-pre.target. May 17 00:50:41.170448 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 17 00:50:41.248813 kernel: fuse: init (API version 7.34) May 17 00:50:41.441841 systemd[1]: Starting systemd-hwdb-update.service... May 17 00:50:41.448031 systemd[1]: Starting systemd-journal-flush.service... May 17 00:50:41.453047 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:50:41.454426 systemd[1]: Starting systemd-random-seed.service... May 17 00:50:41.459173 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:50:41.460605 systemd[1]: Starting systemd-sysusers.service... May 17 00:50:41.468187 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 17 00:50:41.468370 systemd[1]: Finished modprobe@configfs.service. May 17 00:50:41.477000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:41.477000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:41.478186 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 17 00:50:41.478317 systemd[1]: Finished modprobe@fuse.service. May 17 00:50:41.482000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:41.482000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:41.483596 systemd[1]: Finished systemd-modules-load.service. May 17 00:50:41.488000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:41.491324 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 17 00:50:41.500961 systemd[1]: Mounting sys-kernel-config.mount... May 17 00:50:41.508535 systemd-journald[1151]: Time spent on flushing to /var/log/journal/04cbe832a05344928fc282076cc65031 is 14.232ms for 1083 entries. May 17 00:50:41.508535 systemd-journald[1151]: System Journal (/var/log/journal/04cbe832a05344928fc282076cc65031) is 8.0M, max 2.6G, 2.6G free. May 17 00:50:42.422229 systemd-journald[1151]: Received client request to flush runtime journal. May 17 00:50:41.569000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:41.832000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:42.056000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:41.519156 systemd[1]: Starting systemd-sysctl.service... May 17 00:50:41.525449 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 17 00:50:42.423822 udevadm[1193]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. May 17 00:50:41.532662 systemd[1]: Mounted sys-kernel-config.mount. May 17 00:50:41.564329 systemd[1]: Finished systemd-udev-trigger.service. May 17 00:50:41.571907 systemd[1]: Starting systemd-udev-settle.service... May 17 00:50:41.827251 systemd[1]: Finished systemd-random-seed.service. May 17 00:50:41.833427 systemd[1]: Reached target first-boot-complete.target. May 17 00:50:42.052004 systemd[1]: Finished systemd-sysctl.service. May 17 00:50:42.424710 systemd[1]: Finished systemd-journal-flush.service. May 17 00:50:42.429000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:42.789212 systemd[1]: Finished systemd-sysusers.service. May 17 00:50:42.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:42.795250 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 17 00:50:43.105457 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 17 00:50:43.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:43.358610 systemd[1]: Finished systemd-hwdb-update.service. May 17 00:50:43.363000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:43.363000 audit: BPF prog-id=24 op=LOAD May 17 00:50:43.364000 audit: BPF prog-id=25 op=LOAD May 17 00:50:43.364000 audit: BPF prog-id=7 op=UNLOAD May 17 00:50:43.364000 audit: BPF prog-id=8 op=UNLOAD May 17 00:50:43.365535 systemd[1]: Starting systemd-udevd.service... May 17 00:50:43.385223 systemd-udevd[1198]: Using default interface naming scheme 'v252'. May 17 00:50:43.556400 systemd[1]: Started systemd-udevd.service. May 17 00:50:43.566000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:43.568000 audit: BPF prog-id=26 op=LOAD May 17 00:50:43.569660 systemd[1]: Starting systemd-networkd.service... May 17 00:50:43.603386 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. May 17 00:50:43.642000 audit: BPF prog-id=27 op=LOAD May 17 00:50:43.643000 audit: BPF prog-id=28 op=LOAD May 17 00:50:43.643000 audit: BPF prog-id=29 op=LOAD May 17 00:50:43.644634 systemd[1]: Starting systemd-userdbd.service... May 17 00:50:43.668000 audit[1201]: AVC avc: denied { confidentiality } for pid=1201 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 17 00:50:43.682865 kernel: hv_vmbus: registering driver hv_balloon May 17 00:50:43.682969 kernel: mousedev: PS/2 mouse device common for all mice May 17 00:50:43.696764 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 May 17 00:50:43.696964 kernel: hv_balloon: Memory hot add disabled on ARM64 May 17 00:50:43.714897 systemd[1]: Started systemd-userdbd.service. May 17 00:50:43.729118 kernel: hv_utils: Registering HyperV Utility Driver May 17 00:50:43.729229 kernel: hv_vmbus: registering driver hv_utils May 17 00:50:43.736665 kernel: hv_vmbus: registering driver hyperv_fb May 17 00:50:43.736816 kernel: hv_utils: Heartbeat IC version 3.0 May 17 00:50:43.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:43.741821 kernel: hv_utils: Shutdown IC version 3.2 May 17 00:50:43.748177 kernel: hv_utils: TimeSync IC version 4.0 May 17 00:50:43.981795 kernel: hyperv_fb: Synthvid Version major 3, minor 5 May 17 00:50:43.981872 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 May 17 00:50:43.994327 kernel: Console: switching to colour dummy device 80x25 May 17 00:50:43.996076 kernel: Console: switching to colour frame buffer device 128x48 May 17 00:50:43.668000 audit[1201]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab1621fdd0 a1=aa2c a2=ffff8a7624b0 a3=aaab16181010 items=12 ppid=1198 pid=1201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:43.668000 audit: CWD cwd="/" May 17 00:50:43.668000 audit: PATH item=0 name=(null) inode=5849 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:50:43.668000 audit: PATH item=1 name=(null) inode=10624 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:50:43.668000 audit: PATH item=2 name=(null) inode=10624 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:50:43.668000 audit: PATH item=3 name=(null) inode=10625 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:50:43.668000 audit: PATH item=4 name=(null) inode=10624 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:50:43.668000 audit: PATH item=5 name=(null) inode=10626 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:50:43.668000 audit: PATH item=6 name=(null) inode=10624 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:50:43.668000 audit: PATH item=7 name=(null) inode=10627 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:50:43.668000 audit: PATH item=8 name=(null) inode=10624 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:50:43.668000 audit: PATH item=9 name=(null) inode=10628 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:50:43.668000 audit: PATH item=10 name=(null) inode=10624 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:50:43.668000 audit: PATH item=11 name=(null) inode=10629 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:50:43.668000 audit: PROCTITLE proctitle="(udev-worker)" May 17 00:50:44.671848 systemd-networkd[1214]: lo: Link UP May 17 00:50:44.671862 systemd-networkd[1214]: lo: Gained carrier May 17 00:50:44.672302 systemd-networkd[1214]: Enumeration completed May 17 00:50:44.672450 systemd[1]: Started systemd-networkd.service. May 17 00:50:44.676000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:44.678738 systemd[1]: Starting systemd-networkd-wait-online.service... May 17 00:50:44.701603 systemd-networkd[1214]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 00:50:44.729495 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 00:50:44.735897 systemd[1]: Finished systemd-udev-settle.service. May 17 00:50:44.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:44.743135 systemd[1]: Starting lvm2-activation-early.service... May 17 00:50:44.754028 kernel: mlx5_core 86a2:00:02.0 enP34466s1: Link up May 17 00:50:44.799016 kernel: hv_netvsc 000d3ac4-571f-000d-3ac4-571f000d3ac4 eth0: Data path switched to VF: enP34466s1 May 17 00:50:44.800083 systemd-networkd[1214]: enP34466s1: Link UP May 17 00:50:44.800315 systemd-networkd[1214]: eth0: Link UP May 17 00:50:44.800386 systemd-networkd[1214]: eth0: Gained carrier May 17 00:50:44.809324 systemd-networkd[1214]: enP34466s1: Gained carrier May 17 00:50:44.819125 systemd-networkd[1214]: eth0: DHCPv4 address 10.200.20.32/24, gateway 10.200.20.1 acquired from 168.63.129.16 May 17 00:50:45.453348 lvm[1275]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 00:50:45.477128 systemd[1]: Finished lvm2-activation-early.service. May 17 00:50:45.481000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:45.485211 systemd[1]: Reached target cryptsetup.target. May 17 00:50:45.487600 kernel: kauditd_printk_skb: 79 callbacks suppressed May 17 00:50:45.487677 kernel: audit: type=1130 audit(1747443045.481:162): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:45.511943 systemd[1]: Starting lvm2-activation.service... May 17 00:50:45.517240 lvm[1276]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 00:50:45.538038 systemd[1]: Finished lvm2-activation.service. May 17 00:50:45.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:45.549224 systemd[1]: Reached target local-fs-pre.target. May 17 00:50:45.568059 kernel: audit: type=1130 audit(1747443045.542:163): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:45.568532 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 17 00:50:45.568685 systemd[1]: Reached target local-fs.target. May 17 00:50:45.573644 systemd[1]: Reached target machines.target. May 17 00:50:45.580227 systemd[1]: Starting ldconfig.service... May 17 00:50:45.585129 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:50:45.585403 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:50:45.586936 systemd[1]: Starting systemd-boot-update.service... May 17 00:50:45.593099 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 17 00:50:45.600645 systemd[1]: Starting systemd-machine-id-commit.service... May 17 00:50:45.607184 systemd[1]: Starting systemd-sysext.service... May 17 00:50:45.955921 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1278 (bootctl) May 17 00:50:45.957475 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 17 00:50:46.023175 systemd-networkd[1214]: eth0: Gained IPv6LL May 17 00:50:46.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:46.024850 systemd[1]: Finished systemd-networkd-wait-online.service. May 17 00:50:46.051041 kernel: audit: type=1130 audit(1747443046.029:164): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:46.055566 systemd[1]: Unmounting usr-share-oem.mount... May 17 00:50:46.122457 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 17 00:50:46.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:46.151282 kernel: audit: type=1130 audit(1747443046.128:165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:46.319350 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 17 00:50:46.319766 systemd[1]: Unmounted usr-share-oem.mount. May 17 00:50:47.166465 kernel: loop0: detected capacity change from 0 to 211168 May 17 00:50:47.755914 systemd-fsck[1288]: fsck.fat 4.2 (2021-01-31) May 17 00:50:47.755914 systemd-fsck[1288]: /dev/sda1: 236 files, 117182/258078 clusters May 17 00:50:47.758307 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 17 00:50:47.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:47.766567 systemd[1]: Mounting boot.mount... May 17 00:50:47.792107 kernel: audit: type=1130 audit(1747443047.764:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:47.946554 systemd[1]: Mounted boot.mount. May 17 00:50:47.957118 systemd[1]: Finished systemd-boot-update.service. May 17 00:50:47.961000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:47.980054 kernel: audit: type=1130 audit(1747443047.961:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:49.617044 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 17 00:50:49.634031 kernel: loop1: detected capacity change from 0 to 211168 May 17 00:50:49.638505 (sd-sysext)[1296]: Using extensions 'kubernetes'. May 17 00:50:49.640210 (sd-sysext)[1296]: Merged extensions into '/usr'. May 17 00:50:49.658101 systemd[1]: Mounting usr-share-oem.mount... May 17 00:50:49.662462 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:50:49.663987 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:50:49.669585 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:50:49.675346 systemd[1]: Starting modprobe@loop.service... May 17 00:50:49.679662 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:50:49.679808 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:50:49.682460 systemd[1]: Mounted usr-share-oem.mount. May 17 00:50:49.687257 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:50:49.687417 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:50:49.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:49.692936 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:50:49.693116 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:50:49.691000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:49.728338 kernel: audit: type=1130 audit(1747443049.691:168): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:49.728431 kernel: audit: type=1131 audit(1747443049.691:169): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:49.732000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:49.734405 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:50:49.734691 systemd[1]: Finished modprobe@loop.service. May 17 00:50:49.733000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:49.776016 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:50:49.776254 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:50:49.776677 kernel: audit: type=1130 audit(1747443049.732:170): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:49.776728 kernel: audit: type=1131 audit(1747443049.733:171): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:49.774000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:49.774000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:49.778135 systemd[1]: Finished systemd-sysext.service. May 17 00:50:49.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:49.784303 systemd[1]: Starting ensure-sysext.service... May 17 00:50:49.790043 systemd[1]: Starting systemd-tmpfiles-setup.service... May 17 00:50:49.798318 systemd[1]: Reloading. May 17 00:50:49.803096 systemd-tmpfiles[1303]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 17 00:50:49.864311 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2025-05-17T00:50:49Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:50:49.864345 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2025-05-17T00:50:49Z" level=info msg="torcx already run" May 17 00:50:49.931407 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:50:49.931639 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:50:49.949110 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:50:49.959280 systemd-tmpfiles[1303]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 17 00:50:49.960654 systemd-tmpfiles[1303]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 17 00:50:50.022000 audit: BPF prog-id=30 op=LOAD May 17 00:50:50.022000 audit: BPF prog-id=27 op=UNLOAD May 17 00:50:50.022000 audit: BPF prog-id=31 op=LOAD May 17 00:50:50.022000 audit: BPF prog-id=32 op=LOAD May 17 00:50:50.022000 audit: BPF prog-id=28 op=UNLOAD May 17 00:50:50.022000 audit: BPF prog-id=29 op=UNLOAD May 17 00:50:50.024000 audit: BPF prog-id=33 op=LOAD May 17 00:50:50.024000 audit: BPF prog-id=26 op=UNLOAD May 17 00:50:50.024000 audit: BPF prog-id=34 op=LOAD May 17 00:50:50.025000 audit: BPF prog-id=21 op=UNLOAD May 17 00:50:50.025000 audit: BPF prog-id=35 op=LOAD May 17 00:50:50.025000 audit: BPF prog-id=36 op=LOAD May 17 00:50:50.025000 audit: BPF prog-id=22 op=UNLOAD May 17 00:50:50.025000 audit: BPF prog-id=23 op=UNLOAD May 17 00:50:50.027000 audit: BPF prog-id=37 op=LOAD May 17 00:50:50.027000 audit: BPF prog-id=38 op=LOAD May 17 00:50:50.027000 audit: BPF prog-id=24 op=UNLOAD May 17 00:50:50.027000 audit: BPF prog-id=25 op=UNLOAD May 17 00:50:50.046300 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:50:50.047892 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:50:50.054285 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:50:50.060758 systemd[1]: Starting modprobe@loop.service... May 17 00:50:50.065298 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:50:50.065455 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:50:50.066869 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:50:50.067074 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:50:50.071000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:50.071000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:50.072622 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:50:50.072757 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:50:50.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:50.076000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:50.078285 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:50:50.078422 systemd[1]: Finished modprobe@loop.service. May 17 00:50:50.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:50.082000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:50.084792 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:50:50.086331 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:50:50.091829 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:50:50.097663 systemd[1]: Starting modprobe@loop.service... May 17 00:50:50.101969 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:50:50.102147 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:50:50.102989 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:50:50.103168 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:50:50.107000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:50.107000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:50.108437 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:50:50.108574 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:50:50.112000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:50.112000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:50.114251 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:50:50.114404 systemd[1]: Finished modprobe@loop.service. May 17 00:50:50.118000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:50.118000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:50.122339 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:50:50.123822 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:50:50.129608 systemd[1]: Starting modprobe@drm.service... May 17 00:50:50.135576 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:50:50.141679 systemd[1]: Starting modprobe@loop.service... May 17 00:50:50.146283 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:50:50.146443 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:50:50.147528 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:50:50.147683 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:50:50.152000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:50.152000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:50.153573 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 00:50:50.153713 systemd[1]: Finished modprobe@drm.service. May 17 00:50:50.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:50.157000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:50.158780 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:50:50.158928 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:50:50.163000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:50.163000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:50.164804 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:50:50.164937 systemd[1]: Finished modprobe@loop.service. May 17 00:50:50.169000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:50.169000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:50.170894 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:50:50.170968 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:50:50.172053 systemd[1]: Finished ensure-sysext.service. May 17 00:50:50.175000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:53.154294 systemd[1]: Finished systemd-tmpfiles-setup.service. May 17 00:50:53.159000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:53.162816 systemd[1]: Starting audit-rules.service... May 17 00:50:53.165257 kernel: kauditd_printk_skb: 42 callbacks suppressed May 17 00:50:53.165398 kernel: audit: type=1130 audit(1747443053.159:214): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:53.190883 systemd[1]: Starting clean-ca-certificates.service... May 17 00:50:53.197674 systemd[1]: Starting systemd-journal-catalog-update.service... May 17 00:50:53.203000 audit: BPF prog-id=39 op=LOAD May 17 00:50:53.205796 systemd[1]: Starting systemd-resolved.service... May 17 00:50:53.219051 kernel: audit: type=1334 audit(1747443053.203:215): prog-id=39 op=LOAD May 17 00:50:53.218000 audit: BPF prog-id=40 op=LOAD May 17 00:50:53.220937 systemd[1]: Starting systemd-timesyncd.service... May 17 00:50:53.232716 kernel: audit: type=1334 audit(1747443053.218:216): prog-id=40 op=LOAD May 17 00:50:53.234385 systemd[1]: Starting systemd-update-utmp.service... May 17 00:50:53.468000 audit[1399]: SYSTEM_BOOT pid=1399 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 17 00:50:53.471244 systemd[1]: Started systemd-timesyncd.service. May 17 00:50:53.495052 kernel: audit: type=1127 audit(1747443053.468:217): pid=1399 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 17 00:50:53.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:53.495534 systemd[1]: Reached target time-set.target. May 17 00:50:53.515022 kernel: audit: type=1130 audit(1747443053.494:218): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:53.521974 systemd[1]: Finished clean-ca-certificates.service. May 17 00:50:53.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:53.527581 systemd[1]: Finished systemd-update-utmp.service. May 17 00:50:53.552103 kernel: audit: type=1130 audit(1747443053.526:219): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:53.551000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:53.553734 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 00:50:53.572030 kernel: audit: type=1130 audit(1747443053.551:220): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:54.554486 systemd-resolved[1396]: Positive Trust Anchors: May 17 00:50:54.554495 systemd-resolved[1396]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 00:50:54.554523 systemd-resolved[1396]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 00:50:55.097033 systemd[1]: Finished systemd-journal-catalog-update.service. May 17 00:50:55.102000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:55.124365 systemd-resolved[1396]: Using system hostname 'ci-3510.3.7-n-cf89ee32d5'. May 17 00:50:55.125116 kernel: audit: type=1130 audit(1747443055.102:221): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:55.125967 systemd[1]: Started systemd-resolved.service. May 17 00:50:55.129000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:55.132152 systemd[1]: Reached target network.target. May 17 00:50:55.154512 kernel: audit: type=1130 audit(1747443055.129:222): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:50:55.155159 systemd[1]: Reached target network-online.target. May 17 00:50:55.160190 systemd[1]: Reached target nss-lookup.target. May 17 00:50:55.342646 systemd-timesyncd[1398]: Contacted time server 46.37.96.107:123 (0.flatcar.pool.ntp.org). May 17 00:50:55.342720 systemd-timesyncd[1398]: Initial clock synchronization to Sat 2025-05-17 00:50:55.342055 UTC. May 17 00:50:56.307000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 17 00:50:56.311205 augenrules[1414]: No rules May 17 00:50:56.324025 kernel: audit: type=1305 audit(1747443056.307:223): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 17 00:50:56.307000 audit[1414]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffcdb614f0 a2=420 a3=0 items=0 ppid=1393 pid=1414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:50:56.307000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 17 00:50:56.323526 systemd[1]: Finished audit-rules.service. May 17 00:50:57.595048 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 17 00:50:57.595637 systemd[1]: Finished systemd-machine-id-commit.service. May 17 00:51:05.541376 ldconfig[1277]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 17 00:51:05.555988 systemd[1]: Finished ldconfig.service. May 17 00:51:05.565518 systemd[1]: Starting systemd-update-done.service... May 17 00:51:05.585907 systemd[1]: Finished systemd-update-done.service. May 17 00:51:05.591349 systemd[1]: Reached target sysinit.target. May 17 00:51:05.596377 systemd[1]: Started motdgen.path. May 17 00:51:05.600412 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 17 00:51:05.606988 systemd[1]: Started logrotate.timer. May 17 00:51:05.611383 systemd[1]: Started mdadm.timer. May 17 00:51:05.615254 systemd[1]: Started systemd-tmpfiles-clean.timer. May 17 00:51:05.620311 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 17 00:51:05.620341 systemd[1]: Reached target paths.target. May 17 00:51:05.624840 systemd[1]: Reached target timers.target. May 17 00:51:05.631075 systemd[1]: Listening on dbus.socket. May 17 00:51:05.636500 systemd[1]: Starting docker.socket... May 17 00:51:05.643335 systemd[1]: Listening on sshd.socket. May 17 00:51:05.647905 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:51:05.648587 systemd[1]: Listening on docker.socket. May 17 00:51:05.653197 systemd[1]: Reached target sockets.target. May 17 00:51:05.658933 systemd[1]: Reached target basic.target. May 17 00:51:05.663806 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 00:51:05.663947 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 00:51:05.665271 systemd[1]: Starting containerd.service... May 17 00:51:05.671567 systemd[1]: Starting dbus.service... May 17 00:51:05.676761 systemd[1]: Starting enable-oem-cloudinit.service... May 17 00:51:05.682948 systemd[1]: Starting extend-filesystems.service... May 17 00:51:05.687965 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 17 00:51:05.689352 systemd[1]: Starting kubelet.service... May 17 00:51:05.694260 systemd[1]: Starting motdgen.service... May 17 00:51:05.700567 systemd[1]: Started nvidia.service. May 17 00:51:05.706256 systemd[1]: Starting ssh-key-proc-cmdline.service... May 17 00:51:05.712887 systemd[1]: Starting sshd-keygen.service... May 17 00:51:05.719302 systemd[1]: Starting systemd-logind.service... May 17 00:51:05.723580 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:51:05.723655 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 17 00:51:05.724134 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 17 00:51:05.724855 systemd[1]: Starting update-engine.service... May 17 00:51:05.730408 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 17 00:51:05.739062 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 17 00:51:05.739252 systemd[1]: Finished ssh-key-proc-cmdline.service. May 17 00:51:05.745628 jq[1424]: false May 17 00:51:05.745884 jq[1441]: true May 17 00:51:05.761801 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 17 00:51:05.761989 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 17 00:51:05.772812 systemd[1]: motdgen.service: Deactivated successfully. May 17 00:51:05.773022 systemd[1]: Finished motdgen.service. May 17 00:51:05.788071 extend-filesystems[1425]: Found loop1 May 17 00:51:05.788071 extend-filesystems[1425]: Found sda May 17 00:51:05.788071 extend-filesystems[1425]: Found sda1 May 17 00:51:05.788071 extend-filesystems[1425]: Found sda2 May 17 00:51:05.788071 extend-filesystems[1425]: Found sda3 May 17 00:51:05.788071 extend-filesystems[1425]: Found usr May 17 00:51:05.788071 extend-filesystems[1425]: Found sda4 May 17 00:51:05.788071 extend-filesystems[1425]: Found sda6 May 17 00:51:05.788071 extend-filesystems[1425]: Found sda7 May 17 00:51:05.788071 extend-filesystems[1425]: Found sda9 May 17 00:51:05.788071 extend-filesystems[1425]: Checking size of /dev/sda9 May 17 00:51:05.842698 systemd-logind[1436]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) May 17 00:51:05.909234 jq[1444]: true May 17 00:51:05.842882 systemd-logind[1436]: New seat seat0. May 17 00:51:05.916168 env[1446]: time="2025-05-17T00:51:05.916111586Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 17 00:51:05.931971 bash[1473]: Updated "/home/core/.ssh/authorized_keys" May 17 00:51:05.932874 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 17 00:51:05.943424 extend-filesystems[1425]: Old size kept for /dev/sda9 May 17 00:51:05.943424 extend-filesystems[1425]: Found sr0 May 17 00:51:05.949462 systemd[1]: extend-filesystems.service: Deactivated successfully. May 17 00:51:05.949630 systemd[1]: Finished extend-filesystems.service. May 17 00:51:05.980174 env[1446]: time="2025-05-17T00:51:05.975560638Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 17 00:51:05.980174 env[1446]: time="2025-05-17T00:51:05.976499303Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 17 00:51:05.981230 env[1446]: time="2025-05-17T00:51:05.981189788Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.182-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 17 00:51:05.982878 env[1446]: time="2025-05-17T00:51:05.982827682Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 17 00:51:05.983316 env[1446]: time="2025-05-17T00:51:05.983288635Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 00:51:05.984161 env[1446]: time="2025-05-17T00:51:05.984128141Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 17 00:51:05.984303 env[1446]: time="2025-05-17T00:51:05.984271379Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 17 00:51:05.984367 env[1446]: time="2025-05-17T00:51:05.984353178Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 17 00:51:05.984550 env[1446]: time="2025-05-17T00:51:05.984530815Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 17 00:51:05.984871 env[1446]: time="2025-05-17T00:51:05.984840850Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 17 00:51:05.986140 env[1446]: time="2025-05-17T00:51:05.986114230Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 00:51:05.986251 env[1446]: time="2025-05-17T00:51:05.986234628Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 17 00:51:05.986396 env[1446]: time="2025-05-17T00:51:05.986375346Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 17 00:51:05.986483 env[1446]: time="2025-05-17T00:51:05.986466824Z" level=info msg="metadata content store policy set" policy=shared May 17 00:51:06.008052 env[1446]: time="2025-05-17T00:51:06.006203075Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 17 00:51:06.008052 env[1446]: time="2025-05-17T00:51:06.006248874Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 17 00:51:06.008052 env[1446]: time="2025-05-17T00:51:06.006262114Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 17 00:51:06.008052 env[1446]: time="2025-05-17T00:51:06.006306073Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 17 00:51:06.008052 env[1446]: time="2025-05-17T00:51:06.006321793Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 17 00:51:06.008052 env[1446]: time="2025-05-17T00:51:06.006335073Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 17 00:51:06.008052 env[1446]: time="2025-05-17T00:51:06.006348672Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 17 00:51:06.008052 env[1446]: time="2025-05-17T00:51:06.006750786Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 17 00:51:06.008052 env[1446]: time="2025-05-17T00:51:06.006769306Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 17 00:51:06.008052 env[1446]: time="2025-05-17T00:51:06.006781986Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 17 00:51:06.008052 env[1446]: time="2025-05-17T00:51:06.006793986Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 17 00:51:06.008052 env[1446]: time="2025-05-17T00:51:06.006807705Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 17 00:51:06.008052 env[1446]: time="2025-05-17T00:51:06.006938224Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 17 00:51:06.008052 env[1446]: time="2025-05-17T00:51:06.007039942Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 17 00:51:06.008420 env[1446]: time="2025-05-17T00:51:06.007302258Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 17 00:51:06.008420 env[1446]: time="2025-05-17T00:51:06.007328658Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 17 00:51:06.008420 env[1446]: time="2025-05-17T00:51:06.007343097Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 17 00:51:06.008420 env[1446]: time="2025-05-17T00:51:06.007393017Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 17 00:51:06.008420 env[1446]: time="2025-05-17T00:51:06.007405897Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 17 00:51:06.008420 env[1446]: time="2025-05-17T00:51:06.007418336Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 17 00:51:06.008420 env[1446]: time="2025-05-17T00:51:06.007429376Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 17 00:51:06.008420 env[1446]: time="2025-05-17T00:51:06.007494975Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 17 00:51:06.008420 env[1446]: time="2025-05-17T00:51:06.007511935Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 17 00:51:06.008420 env[1446]: time="2025-05-17T00:51:06.007522975Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 17 00:51:06.008420 env[1446]: time="2025-05-17T00:51:06.007534015Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 17 00:51:06.008420 env[1446]: time="2025-05-17T00:51:06.007547894Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 17 00:51:06.008420 env[1446]: time="2025-05-17T00:51:06.007668133Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 17 00:51:06.008420 env[1446]: time="2025-05-17T00:51:06.007685812Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 17 00:51:06.008420 env[1446]: time="2025-05-17T00:51:06.007698732Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 17 00:51:06.008715 env[1446]: time="2025-05-17T00:51:06.007711452Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 17 00:51:06.008715 env[1446]: time="2025-05-17T00:51:06.007729052Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 17 00:51:06.008715 env[1446]: time="2025-05-17T00:51:06.007741092Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 17 00:51:06.008715 env[1446]: time="2025-05-17T00:51:06.007758811Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 17 00:51:06.008715 env[1446]: time="2025-05-17T00:51:06.007792931Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 17 00:51:06.009289 env[1446]: time="2025-05-17T00:51:06.007992368Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 17 00:51:06.009289 env[1446]: time="2025-05-17T00:51:06.008906474Z" level=info msg="Connect containerd service" May 17 00:51:06.009289 env[1446]: time="2025-05-17T00:51:06.008962953Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 17 00:51:06.025438 env[1446]: time="2025-05-17T00:51:06.010330133Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 17 00:51:06.025438 env[1446]: time="2025-05-17T00:51:06.010574609Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 17 00:51:06.025438 env[1446]: time="2025-05-17T00:51:06.010610689Z" level=info msg=serving... address=/run/containerd/containerd.sock May 17 00:51:06.025438 env[1446]: time="2025-05-17T00:51:06.010655688Z" level=info msg="containerd successfully booted in 0.099979s" May 17 00:51:06.025438 env[1446]: time="2025-05-17T00:51:06.016068687Z" level=info msg="Start subscribing containerd event" May 17 00:51:06.025438 env[1446]: time="2025-05-17T00:51:06.016147926Z" level=info msg="Start recovering state" May 17 00:51:06.025438 env[1446]: time="2025-05-17T00:51:06.016221605Z" level=info msg="Start event monitor" May 17 00:51:06.025438 env[1446]: time="2025-05-17T00:51:06.016242444Z" level=info msg="Start snapshots syncer" May 17 00:51:06.025438 env[1446]: time="2025-05-17T00:51:06.016257524Z" level=info msg="Start cni network conf syncer for default" May 17 00:51:06.025438 env[1446]: time="2025-05-17T00:51:06.016266564Z" level=info msg="Start streaming server" May 17 00:51:06.010729 systemd[1]: Started containerd.service. May 17 00:51:06.031732 dbus-daemon[1423]: [system] SELinux support is enabled May 17 00:51:06.031959 systemd[1]: Started dbus.service. May 17 00:51:06.038796 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 17 00:51:06.039323 dbus-daemon[1423]: [system] Successfully activated service 'org.freedesktop.systemd1' May 17 00:51:06.038823 systemd[1]: Reached target system-config.target. May 17 00:51:06.047699 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 17 00:51:06.047725 systemd[1]: Reached target user-config.target. May 17 00:51:06.055569 systemd[1]: Started systemd-logind.service. May 17 00:51:06.075049 systemd[1]: nvidia.service: Deactivated successfully. May 17 00:51:06.452257 update_engine[1440]: I0517 00:51:06.437726 1440 main.cc:92] Flatcar Update Engine starting May 17 00:51:06.539027 systemd[1]: Started update-engine.service. May 17 00:51:06.539370 update_engine[1440]: I0517 00:51:06.539085 1440 update_check_scheduler.cc:74] Next update check in 5m42s May 17 00:51:06.546749 systemd[1]: Started locksmithd.service. May 17 00:51:06.653923 systemd[1]: Started kubelet.service. May 17 00:51:07.089691 kubelet[1524]: E0517 00:51:07.089652 1524 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:51:07.091951 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:51:07.092096 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:51:08.220237 locksmithd[1521]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 17 00:51:09.382689 sshd_keygen[1439]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 17 00:51:09.400672 systemd[1]: Finished sshd-keygen.service. May 17 00:51:09.407286 systemd[1]: Starting issuegen.service... May 17 00:51:09.412105 systemd[1]: Started waagent.service. May 17 00:51:09.417423 systemd[1]: issuegen.service: Deactivated successfully. May 17 00:51:09.417612 systemd[1]: Finished issuegen.service. May 17 00:51:09.423741 systemd[1]: Starting systemd-user-sessions.service... May 17 00:51:09.458266 systemd[1]: Finished systemd-user-sessions.service. May 17 00:51:09.465563 systemd[1]: Started getty@tty1.service. May 17 00:51:09.472631 systemd[1]: Started serial-getty@ttyAMA0.service. May 17 00:51:09.478899 systemd[1]: Reached target getty.target. May 17 00:51:09.483417 systemd[1]: Reached target multi-user.target. May 17 00:51:09.489693 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 17 00:51:09.502526 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 17 00:51:09.502702 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 17 00:51:09.509462 systemd[1]: Startup finished in 782ms (kernel) + 15.661s (initrd) + 47.970s (userspace) = 1min 4.413s. May 17 00:51:10.051308 login[1548]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) May 17 00:51:10.052449 login[1549]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) May 17 00:51:10.094068 systemd[1]: Created slice user-500.slice. May 17 00:51:10.095268 systemd[1]: Starting user-runtime-dir@500.service... May 17 00:51:10.098062 systemd-logind[1436]: New session 2 of user core. May 17 00:51:10.102108 systemd-logind[1436]: New session 1 of user core. May 17 00:51:10.138127 systemd[1]: Finished user-runtime-dir@500.service. May 17 00:51:10.139715 systemd[1]: Starting user@500.service... May 17 00:51:10.172790 (systemd)[1552]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 17 00:51:10.338634 systemd[1552]: Queued start job for default target default.target. May 17 00:51:10.339195 systemd[1552]: Reached target paths.target. May 17 00:51:10.339216 systemd[1552]: Reached target sockets.target. May 17 00:51:10.339227 systemd[1552]: Reached target timers.target. May 17 00:51:10.339238 systemd[1552]: Reached target basic.target. May 17 00:51:10.339282 systemd[1552]: Reached target default.target. May 17 00:51:10.339308 systemd[1552]: Startup finished in 159ms. May 17 00:51:10.339355 systemd[1]: Started user@500.service. May 17 00:51:10.340463 systemd[1]: Started session-1.scope. May 17 00:51:10.341210 systemd[1]: Started session-2.scope. May 17 00:51:16.344301 waagent[1545]: 2025-05-17T00:51:16.344164Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 May 17 00:51:16.352348 waagent[1545]: 2025-05-17T00:51:16.352240Z INFO Daemon Daemon OS: flatcar 3510.3.7 May 17 00:51:16.357363 waagent[1545]: 2025-05-17T00:51:16.357273Z INFO Daemon Daemon Python: 3.9.16 May 17 00:51:16.364290 waagent[1545]: 2025-05-17T00:51:16.364168Z INFO Daemon Daemon Run daemon May 17 00:51:16.369279 waagent[1545]: 2025-05-17T00:51:16.369177Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.7' May 17 00:51:16.388815 waagent[1545]: 2025-05-17T00:51:16.388650Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. May 17 00:51:16.406209 waagent[1545]: 2025-05-17T00:51:16.406039Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' May 17 00:51:16.417026 waagent[1545]: 2025-05-17T00:51:16.416908Z INFO Daemon Daemon cloud-init is enabled: False May 17 00:51:16.422796 waagent[1545]: 2025-05-17T00:51:16.422683Z INFO Daemon Daemon Using waagent for provisioning May 17 00:51:16.429921 waagent[1545]: 2025-05-17T00:51:16.429819Z INFO Daemon Daemon Activate resource disk May 17 00:51:16.441941 waagent[1545]: 2025-05-17T00:51:16.441820Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb May 17 00:51:16.460222 waagent[1545]: 2025-05-17T00:51:16.460121Z INFO Daemon Daemon Found device: None May 17 00:51:16.465470 waagent[1545]: 2025-05-17T00:51:16.465372Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology May 17 00:51:16.476188 waagent[1545]: 2025-05-17T00:51:16.476068Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 May 17 00:51:16.490371 waagent[1545]: 2025-05-17T00:51:16.490285Z INFO Daemon Daemon Clean protocol and wireserver endpoint May 17 00:51:16.496794 waagent[1545]: 2025-05-17T00:51:16.496692Z INFO Daemon Daemon Running default provisioning handler May 17 00:51:16.511785 waagent[1545]: 2025-05-17T00:51:16.511613Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. May 17 00:51:16.528598 waagent[1545]: 2025-05-17T00:51:16.528434Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' May 17 00:51:16.539333 waagent[1545]: 2025-05-17T00:51:16.539223Z INFO Daemon Daemon cloud-init is enabled: False May 17 00:51:16.545153 waagent[1545]: 2025-05-17T00:51:16.545052Z INFO Daemon Daemon Copying ovf-env.xml May 17 00:51:16.633538 waagent[1545]: 2025-05-17T00:51:16.633289Z INFO Daemon Daemon Successfully mounted dvd May 17 00:51:16.714217 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. May 17 00:51:16.761395 waagent[1545]: 2025-05-17T00:51:16.761216Z INFO Daemon Daemon Detect protocol endpoint May 17 00:51:16.766808 waagent[1545]: 2025-05-17T00:51:16.766673Z INFO Daemon Daemon Clean protocol and wireserver endpoint May 17 00:51:16.773791 waagent[1545]: 2025-05-17T00:51:16.773657Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler May 17 00:51:16.781524 waagent[1545]: 2025-05-17T00:51:16.781341Z INFO Daemon Daemon Test for route to 168.63.129.16 May 17 00:51:16.788256 waagent[1545]: 2025-05-17T00:51:16.788145Z INFO Daemon Daemon Route to 168.63.129.16 exists May 17 00:51:16.795684 waagent[1545]: 2025-05-17T00:51:16.795568Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 May 17 00:51:16.929296 waagent[1545]: 2025-05-17T00:51:16.929145Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 May 17 00:51:16.937344 waagent[1545]: 2025-05-17T00:51:16.937291Z INFO Daemon Daemon Wire protocol version:2012-11-30 May 17 00:51:16.943660 waagent[1545]: 2025-05-17T00:51:16.943558Z INFO Daemon Daemon Server preferred version:2015-04-05 May 17 00:51:17.213469 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 17 00:51:17.213643 systemd[1]: Stopped kubelet.service. May 17 00:51:17.215210 systemd[1]: Starting kubelet.service... May 17 00:51:17.359164 systemd[1]: Started kubelet.service. May 17 00:51:17.446030 kubelet[1592]: E0517 00:51:17.445962 1592 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:51:17.448528 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:51:17.448660 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:51:17.724982 waagent[1545]: 2025-05-17T00:51:17.724809Z INFO Daemon Daemon Initializing goal state during protocol detection May 17 00:51:17.742530 waagent[1545]: 2025-05-17T00:51:17.742439Z INFO Daemon Daemon Forcing an update of the goal state.. May 17 00:51:17.749105 waagent[1545]: 2025-05-17T00:51:17.748991Z INFO Daemon Daemon Fetching goal state [incarnation 1] May 17 00:51:20.588122 waagent[1545]: 2025-05-17T00:51:20.587943Z INFO Daemon Daemon Found private key matching thumbprint CFDDF50B59AAF4F04761D3A00BF9047405E98730 May 17 00:51:20.597751 waagent[1545]: 2025-05-17T00:51:20.597645Z INFO Daemon Daemon Certificate with thumbprint 213C9E8784C490BCB8C3AEB4512D33ADB8E8B146 has no matching private key. May 17 00:51:20.608095 waagent[1545]: 2025-05-17T00:51:20.607965Z INFO Daemon Daemon Fetch goal state completed May 17 00:51:20.667471 waagent[1545]: 2025-05-17T00:51:20.667400Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 94fe1518-a5b0-4c39-89ae-5d377f055576 New eTag: 12969401352157535079] May 17 00:51:20.679271 waagent[1545]: 2025-05-17T00:51:20.679167Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob May 17 00:51:20.727297 waagent[1545]: 2025-05-17T00:51:20.727218Z INFO Daemon Daemon Starting provisioning May 17 00:51:20.733294 waagent[1545]: 2025-05-17T00:51:20.733173Z INFO Daemon Daemon Handle ovf-env.xml. May 17 00:51:20.738594 waagent[1545]: 2025-05-17T00:51:20.738482Z INFO Daemon Daemon Set hostname [ci-3510.3.7-n-cf89ee32d5] May 17 00:51:20.777930 waagent[1545]: 2025-05-17T00:51:20.777773Z INFO Daemon Daemon Publish hostname [ci-3510.3.7-n-cf89ee32d5] May 17 00:51:20.785274 waagent[1545]: 2025-05-17T00:51:20.785162Z INFO Daemon Daemon Examine /proc/net/route for primary interface May 17 00:51:20.792599 waagent[1545]: 2025-05-17T00:51:20.792498Z INFO Daemon Daemon Primary interface is [eth0] May 17 00:51:20.810894 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. May 17 00:51:20.811138 systemd[1]: Stopped systemd-networkd-wait-online.service. May 17 00:51:20.811198 systemd[1]: Stopping systemd-networkd-wait-online.service... May 17 00:51:20.811440 systemd[1]: Stopping systemd-networkd.service... May 17 00:51:20.816073 systemd-networkd[1214]: eth0: DHCPv6 lease lost May 17 00:51:20.817976 systemd[1]: systemd-networkd.service: Deactivated successfully. May 17 00:51:20.818185 systemd[1]: Stopped systemd-networkd.service. May 17 00:51:20.820452 systemd[1]: Starting systemd-networkd.service... May 17 00:51:20.850492 systemd-networkd[1608]: enP34466s1: Link UP May 17 00:51:20.850510 systemd-networkd[1608]: enP34466s1: Gained carrier May 17 00:51:20.851448 systemd-networkd[1608]: eth0: Link UP May 17 00:51:20.851462 systemd-networkd[1608]: eth0: Gained carrier May 17 00:51:20.851772 systemd-networkd[1608]: lo: Link UP May 17 00:51:20.851783 systemd-networkd[1608]: lo: Gained carrier May 17 00:51:20.852185 systemd-networkd[1608]: eth0: Gained IPv6LL May 17 00:51:20.852644 systemd-networkd[1608]: Enumeration completed May 17 00:51:20.852779 systemd[1]: Started systemd-networkd.service. May 17 00:51:20.860476 waagent[1545]: 2025-05-17T00:51:20.854475Z INFO Daemon Daemon Create user account if not exists May 17 00:51:20.854774 systemd[1]: Starting systemd-networkd-wait-online.service... May 17 00:51:20.861765 waagent[1545]: 2025-05-17T00:51:20.861669Z INFO Daemon Daemon User core already exists, skip useradd May 17 00:51:20.862187 systemd-networkd[1608]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 00:51:20.869052 waagent[1545]: 2025-05-17T00:51:20.868919Z INFO Daemon Daemon Configure sudoer May 17 00:51:20.875796 waagent[1545]: 2025-05-17T00:51:20.875684Z INFO Daemon Daemon Configure sshd May 17 00:51:20.880352 waagent[1545]: 2025-05-17T00:51:20.880216Z INFO Daemon Daemon Deploy ssh public key. May 17 00:51:20.889173 systemd-networkd[1608]: eth0: DHCPv4 address 10.200.20.32/24, gateway 10.200.20.1 acquired from 168.63.129.16 May 17 00:51:20.892230 systemd[1]: Finished systemd-networkd-wait-online.service. May 17 00:51:22.054111 waagent[1545]: 2025-05-17T00:51:22.053973Z INFO Daemon Daemon Provisioning complete May 17 00:51:22.073596 waagent[1545]: 2025-05-17T00:51:22.073494Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping May 17 00:51:22.081087 waagent[1545]: 2025-05-17T00:51:22.080961Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. May 17 00:51:22.092866 waagent[1545]: 2025-05-17T00:51:22.092756Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent May 17 00:51:22.408326 waagent[1617]: 2025-05-17T00:51:22.408173Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent May 17 00:51:22.409495 waagent[1617]: 2025-05-17T00:51:22.409430Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 00:51:22.409743 waagent[1617]: 2025-05-17T00:51:22.409694Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 00:51:22.422809 waagent[1617]: 2025-05-17T00:51:22.422715Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. May 17 00:51:22.423186 waagent[1617]: 2025-05-17T00:51:22.423133Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] May 17 00:51:22.499581 waagent[1617]: 2025-05-17T00:51:22.499435Z INFO ExtHandler ExtHandler Found private key matching thumbprint CFDDF50B59AAF4F04761D3A00BF9047405E98730 May 17 00:51:22.500058 waagent[1617]: 2025-05-17T00:51:22.499956Z INFO ExtHandler ExtHandler Certificate with thumbprint 213C9E8784C490BCB8C3AEB4512D33ADB8E8B146 has no matching private key. May 17 00:51:22.500505 waagent[1617]: 2025-05-17T00:51:22.500382Z INFO ExtHandler ExtHandler Fetch goal state completed May 17 00:51:22.515950 waagent[1617]: 2025-05-17T00:51:22.515887Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: 9e88c416-7610-4e62-8d73-09ee4bb21902 New eTag: 12969401352157535079] May 17 00:51:22.516748 waagent[1617]: 2025-05-17T00:51:22.516685Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob May 17 00:51:22.585443 waagent[1617]: 2025-05-17T00:51:22.585303Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.7; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; May 17 00:51:22.609408 waagent[1617]: 2025-05-17T00:51:22.609317Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1617 May 17 00:51:22.613591 waagent[1617]: 2025-05-17T00:51:22.613518Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.7', '', 'Flatcar Container Linux by Kinvolk'] May 17 00:51:22.615147 waagent[1617]: 2025-05-17T00:51:22.615087Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules May 17 00:51:22.711368 waagent[1617]: 2025-05-17T00:51:22.711256Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service May 17 00:51:22.711967 waagent[1617]: 2025-05-17T00:51:22.711907Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup May 17 00:51:22.721093 waagent[1617]: 2025-05-17T00:51:22.720996Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now May 17 00:51:22.721801 waagent[1617]: 2025-05-17T00:51:22.721739Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' May 17 00:51:22.723180 waagent[1617]: 2025-05-17T00:51:22.723112Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] May 17 00:51:22.724751 waagent[1617]: 2025-05-17T00:51:22.724680Z INFO ExtHandler ExtHandler Starting env monitor service. May 17 00:51:22.725052 waagent[1617]: 2025-05-17T00:51:22.724945Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 00:51:22.725681 waagent[1617]: 2025-05-17T00:51:22.725610Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 00:51:22.726343 waagent[1617]: 2025-05-17T00:51:22.726281Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. May 17 00:51:22.726673 waagent[1617]: 2025-05-17T00:51:22.726611Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: May 17 00:51:22.726673 waagent[1617]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT May 17 00:51:22.726673 waagent[1617]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 May 17 00:51:22.726673 waagent[1617]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 May 17 00:51:22.726673 waagent[1617]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 May 17 00:51:22.726673 waagent[1617]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 May 17 00:51:22.726673 waagent[1617]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 May 17 00:51:22.729309 waagent[1617]: 2025-05-17T00:51:22.729116Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. May 17 00:51:22.730435 waagent[1617]: 2025-05-17T00:51:22.730337Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 00:51:22.730670 waagent[1617]: 2025-05-17T00:51:22.730604Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 00:51:22.731435 waagent[1617]: 2025-05-17T00:51:22.731345Z INFO EnvHandler ExtHandler Configure routes May 17 00:51:22.731684 waagent[1617]: 2025-05-17T00:51:22.731599Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread May 17 00:51:22.731904 waagent[1617]: 2025-05-17T00:51:22.731840Z INFO ExtHandler ExtHandler Start Extension Telemetry service. May 17 00:51:22.732113 waagent[1617]: 2025-05-17T00:51:22.732049Z INFO EnvHandler ExtHandler Gateway:None May 17 00:51:22.733146 waagent[1617]: 2025-05-17T00:51:22.733031Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True May 17 00:51:22.733356 waagent[1617]: 2025-05-17T00:51:22.733270Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. May 17 00:51:22.733434 waagent[1617]: 2025-05-17T00:51:22.733378Z INFO EnvHandler ExtHandler Routes:None May 17 00:51:22.736343 waagent[1617]: 2025-05-17T00:51:22.736266Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread May 17 00:51:22.754201 waagent[1617]: 2025-05-17T00:51:22.754130Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) May 17 00:51:22.755103 waagent[1617]: 2025-05-17T00:51:22.754985Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required May 17 00:51:22.758950 waagent[1617]: 2025-05-17T00:51:22.758841Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' May 17 00:51:22.771016 waagent[1617]: 2025-05-17T00:51:22.770908Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1608' May 17 00:51:22.811306 waagent[1617]: 2025-05-17T00:51:22.811231Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. May 17 00:51:22.849599 waagent[1617]: 2025-05-17T00:51:22.848233Z INFO MonitorHandler ExtHandler Network interfaces: May 17 00:51:22.849599 waagent[1617]: Executing ['ip', '-a', '-o', 'link']: May 17 00:51:22.849599 waagent[1617]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 May 17 00:51:22.849599 waagent[1617]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:c4:57:1f brd ff:ff:ff:ff:ff:ff May 17 00:51:22.849599 waagent[1617]: 3: enP34466s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:c4:57:1f brd ff:ff:ff:ff:ff:ff\ altname enP34466p0s2 May 17 00:51:22.849599 waagent[1617]: Executing ['ip', '-4', '-a', '-o', 'address']: May 17 00:51:22.849599 waagent[1617]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever May 17 00:51:22.849599 waagent[1617]: 2: eth0 inet 10.200.20.32/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever May 17 00:51:22.849599 waagent[1617]: Executing ['ip', '-6', '-a', '-o', 'address']: May 17 00:51:22.849599 waagent[1617]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever May 17 00:51:22.849599 waagent[1617]: 2: eth0 inet6 fe80::20d:3aff:fec4:571f/64 scope link \ valid_lft forever preferred_lft forever May 17 00:51:23.112132 waagent[1617]: 2025-05-17T00:51:23.112059Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.13.1.1 -- exiting May 17 00:51:24.097996 waagent[1545]: 2025-05-17T00:51:24.097816Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running May 17 00:51:24.103390 waagent[1545]: 2025-05-17T00:51:24.103308Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.13.1.1 to be the latest agent May 17 00:51:25.419655 waagent[1655]: 2025-05-17T00:51:25.419546Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.13.1.1) May 17 00:51:25.421651 waagent[1655]: 2025-05-17T00:51:25.421573Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.7 May 17 00:51:25.421930 waagent[1655]: 2025-05-17T00:51:25.421879Z INFO ExtHandler ExtHandler Python: 3.9.16 May 17 00:51:25.422191 waagent[1655]: 2025-05-17T00:51:25.422139Z INFO ExtHandler ExtHandler CPU Arch: aarch64 May 17 00:51:25.437896 waagent[1655]: 2025-05-17T00:51:25.437733Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.7; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; Arch: aarch64; systemd: True; systemd_version: systemd 252 (252); LISDrivers: Absent; logrotate: logrotate 3.20.1; May 17 00:51:25.438656 waagent[1655]: 2025-05-17T00:51:25.438588Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 00:51:25.438958 waagent[1655]: 2025-05-17T00:51:25.438905Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 00:51:25.439360 waagent[1655]: 2025-05-17T00:51:25.439302Z INFO ExtHandler ExtHandler Initializing the goal state... May 17 00:51:25.454141 waagent[1655]: 2025-05-17T00:51:25.454032Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] May 17 00:51:25.469151 waagent[1655]: 2025-05-17T00:51:25.469075Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.164 May 17 00:51:25.470575 waagent[1655]: 2025-05-17T00:51:25.470504Z INFO ExtHandler May 17 00:51:25.470875 waagent[1655]: 2025-05-17T00:51:25.470819Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 16f85087-1d91-4bf1-83ce-55fec9e48642 eTag: 12969401352157535079 source: Fabric] May 17 00:51:25.471806 waagent[1655]: 2025-05-17T00:51:25.471744Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. May 17 00:51:25.473331 waagent[1655]: 2025-05-17T00:51:25.473261Z INFO ExtHandler May 17 00:51:25.473643 waagent[1655]: 2025-05-17T00:51:25.473588Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] May 17 00:51:25.481218 waagent[1655]: 2025-05-17T00:51:25.481153Z INFO ExtHandler ExtHandler Downloading artifacts profile blob May 17 00:51:25.481972 waagent[1655]: 2025-05-17T00:51:25.481921Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required May 17 00:51:25.513297 waagent[1655]: 2025-05-17T00:51:25.513223Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. May 17 00:51:25.596066 waagent[1655]: 2025-05-17T00:51:25.595860Z INFO ExtHandler Downloaded certificate {'thumbprint': 'CFDDF50B59AAF4F04761D3A00BF9047405E98730', 'hasPrivateKey': True} May 17 00:51:25.597456 waagent[1655]: 2025-05-17T00:51:25.597389Z INFO ExtHandler Downloaded certificate {'thumbprint': '213C9E8784C490BCB8C3AEB4512D33ADB8E8B146', 'hasPrivateKey': False} May 17 00:51:25.598678 waagent[1655]: 2025-05-17T00:51:25.598615Z INFO ExtHandler Fetch goal state from WireServer completed May 17 00:51:25.599782 waagent[1655]: 2025-05-17T00:51:25.599717Z INFO ExtHandler ExtHandler Goal state initialization completed. May 17 00:51:25.620051 waagent[1655]: 2025-05-17T00:51:25.619914Z INFO ExtHandler ExtHandler OpenSSL version: OpenSSL 3.0.15 3 Sep 2024 (Library: OpenSSL 3.0.15 3 Sep 2024) May 17 00:51:25.629905 waagent[1655]: 2025-05-17T00:51:25.629767Z INFO ExtHandler ExtHandler Using iptables [version 1.8.8] to manage firewall rules May 17 00:51:25.634579 waagent[1655]: 2025-05-17T00:51:25.634445Z INFO ExtHandler ExtHandler Did not find a legacy firewall rule: ['iptables', '-w', '-t', 'security', '-C', 'OUTPUT', '-d', '168.63.129.16', '-p', 'tcp', '-m', 'conntrack', '--ctstate', 'INVALID,NEW', '-j', 'ACCEPT'] May 17 00:51:25.634978 waagent[1655]: 2025-05-17T00:51:25.634924Z INFO ExtHandler ExtHandler Checking state of the firewall May 17 00:51:25.679577 waagent[1655]: 2025-05-17T00:51:25.679380Z WARNING ExtHandler ExtHandler The firewall rules for Azure Fabric are not setup correctly (the environment thread will fix it): The following rules are missing: ['ACCEPT DNS', 'DROP'] due to: ['iptables: Bad rule (does a matching rule exist in that chain?).\n', 'iptables: Bad rule (does a matching rule exist in that chain?).\n']. Current state: May 17 00:51:25.679577 waagent[1655]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) May 17 00:51:25.679577 waagent[1655]: pkts bytes target prot opt in out source destination May 17 00:51:25.679577 waagent[1655]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) May 17 00:51:25.679577 waagent[1655]: pkts bytes target prot opt in out source destination May 17 00:51:25.679577 waagent[1655]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) May 17 00:51:25.679577 waagent[1655]: pkts bytes target prot opt in out source destination May 17 00:51:25.679577 waagent[1655]: 54 7813 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 May 17 00:51:25.681246 waagent[1655]: 2025-05-17T00:51:25.681171Z INFO ExtHandler ExtHandler Setting up persistent firewall rules May 17 00:51:25.684791 waagent[1655]: 2025-05-17T00:51:25.684652Z INFO ExtHandler ExtHandler The firewalld service is not present on the system May 17 00:51:25.685291 waagent[1655]: 2025-05-17T00:51:25.685232Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service May 17 00:51:25.685813 waagent[1655]: 2025-05-17T00:51:25.685752Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup May 17 00:51:25.695063 waagent[1655]: 2025-05-17T00:51:25.694979Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now May 17 00:51:25.695828 waagent[1655]: 2025-05-17T00:51:25.695763Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' May 17 00:51:25.704821 waagent[1655]: 2025-05-17T00:51:25.704726Z INFO ExtHandler ExtHandler WALinuxAgent-2.13.1.1 running as process 1655 May 17 00:51:25.708514 waagent[1655]: 2025-05-17T00:51:25.708424Z INFO ExtHandler ExtHandler [CGI] Cgroups is not currently supported on ['flatcar', '3510.3.7', '', 'Flatcar Container Linux by Kinvolk'] May 17 00:51:25.709638 waagent[1655]: 2025-05-17T00:51:25.709569Z INFO ExtHandler ExtHandler [CGI] Agent will reset the quotas in case cgroup usage went from enabled to disabled May 17 00:51:25.710789 waagent[1655]: 2025-05-17T00:51:25.710725Z INFO ExtHandler ExtHandler [CGI] Agent cgroups enabled: False May 17 00:51:25.713882 waagent[1655]: 2025-05-17T00:51:25.713810Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: 1. configuration enabled [True], 2. cgroups v1 enabled [False] OR cgroups v2 is in use and v2 resource limiting configuration enabled [False], 3. python supported: [True] May 17 00:51:25.715679 waagent[1655]: 2025-05-17T00:51:25.715605Z INFO ExtHandler ExtHandler Starting env monitor service. May 17 00:51:25.715990 waagent[1655]: 2025-05-17T00:51:25.715911Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 00:51:25.716597 waagent[1655]: 2025-05-17T00:51:25.716533Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 00:51:25.717226 waagent[1655]: 2025-05-17T00:51:25.717155Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. May 17 00:51:25.717916 waagent[1655]: 2025-05-17T00:51:25.717849Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. May 17 00:51:25.718717 waagent[1655]: 2025-05-17T00:51:25.718557Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread May 17 00:51:25.718949 waagent[1655]: 2025-05-17T00:51:25.718869Z INFO ExtHandler ExtHandler Start Extension Telemetry service. May 17 00:51:25.719100 waagent[1655]: 2025-05-17T00:51:25.719031Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: May 17 00:51:25.719100 waagent[1655]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT May 17 00:51:25.719100 waagent[1655]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 May 17 00:51:25.719100 waagent[1655]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 May 17 00:51:25.719100 waagent[1655]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 May 17 00:51:25.719100 waagent[1655]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 May 17 00:51:25.719100 waagent[1655]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 May 17 00:51:25.719821 waagent[1655]: 2025-05-17T00:51:25.719753Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 00:51:25.722468 waagent[1655]: 2025-05-17T00:51:25.722356Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 00:51:25.725042 waagent[1655]: 2025-05-17T00:51:25.724948Z INFO EnvHandler ExtHandler Configure routes May 17 00:51:25.725149 waagent[1655]: 2025-05-17T00:51:25.724464Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True May 17 00:51:25.727407 waagent[1655]: 2025-05-17T00:51:25.727249Z INFO EnvHandler ExtHandler Gateway:None May 17 00:51:25.727882 waagent[1655]: 2025-05-17T00:51:25.727814Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread May 17 00:51:25.728210 waagent[1655]: 2025-05-17T00:51:25.728125Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. May 17 00:51:25.730691 waagent[1655]: 2025-05-17T00:51:25.730603Z INFO EnvHandler ExtHandler Routes:None May 17 00:51:25.749609 waagent[1655]: 2025-05-17T00:51:25.749519Z INFO MonitorHandler ExtHandler Network interfaces: May 17 00:51:25.749609 waagent[1655]: Executing ['ip', '-a', '-o', 'link']: May 17 00:51:25.749609 waagent[1655]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 May 17 00:51:25.749609 waagent[1655]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:c4:57:1f brd ff:ff:ff:ff:ff:ff May 17 00:51:25.749609 waagent[1655]: 3: enP34466s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:c4:57:1f brd ff:ff:ff:ff:ff:ff\ altname enP34466p0s2 May 17 00:51:25.749609 waagent[1655]: Executing ['ip', '-4', '-a', '-o', 'address']: May 17 00:51:25.749609 waagent[1655]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever May 17 00:51:25.749609 waagent[1655]: 2: eth0 inet 10.200.20.32/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever May 17 00:51:25.749609 waagent[1655]: Executing ['ip', '-6', '-a', '-o', 'address']: May 17 00:51:25.749609 waagent[1655]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever May 17 00:51:25.749609 waagent[1655]: 2: eth0 inet6 fe80::20d:3aff:fec4:571f/64 scope link \ valid_lft forever preferred_lft forever May 17 00:51:25.758189 waagent[1655]: 2025-05-17T00:51:25.758092Z INFO ExtHandler ExtHandler Downloading agent manifest May 17 00:51:25.777538 waagent[1655]: 2025-05-17T00:51:25.777362Z INFO ExtHandler ExtHandler May 17 00:51:25.779032 waagent[1655]: 2025-05-17T00:51:25.778919Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: db057fda-154e-4f8a-9284-7920d3774375 correlation cef15bf8-e2e5-40dc-bb19-65e6ff5a4736 created: 2025-05-17T00:49:22.093750Z] May 17 00:51:25.782576 waagent[1655]: 2025-05-17T00:51:25.782470Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. May 17 00:51:25.788299 waagent[1655]: 2025-05-17T00:51:25.788203Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 10 ms] May 17 00:51:25.807879 waagent[1655]: 2025-05-17T00:51:25.807768Z INFO EnvHandler ExtHandler Using iptables [version 1.8.8] to manage firewall rules May 17 00:51:25.816242 waagent[1655]: 2025-05-17T00:51:25.816154Z INFO ExtHandler ExtHandler Looking for existing remote access users. May 17 00:51:25.822050 waagent[1655]: 2025-05-17T00:51:25.821780Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.13.1.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 5B5BA90B-178D-49DC-B47D-9E4776697387;UpdateGSErrors: 0;AutoUpdate: 1;UpdateMode: SelfUpdate;] May 17 00:51:25.835030 waagent[1655]: 2025-05-17T00:51:25.834901Z WARNING EnvHandler ExtHandler The firewall is not configured correctly. The following rules are missing: ['ACCEPT DNS', 'DROP'] due to: ['iptables: Bad rule (does a matching rule exist in that chain?).\n', 'iptables: Bad rule (does a matching rule exist in that chain?).\n']. Will reset it. Current state: May 17 00:51:25.835030 waagent[1655]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) May 17 00:51:25.835030 waagent[1655]: pkts bytes target prot opt in out source destination May 17 00:51:25.835030 waagent[1655]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) May 17 00:51:25.835030 waagent[1655]: pkts bytes target prot opt in out source destination May 17 00:51:25.835030 waagent[1655]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) May 17 00:51:25.835030 waagent[1655]: pkts bytes target prot opt in out source destination May 17 00:51:25.835030 waagent[1655]: 86 14647 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 May 17 00:51:25.889409 waagent[1655]: 2025-05-17T00:51:25.889311Z INFO EnvHandler ExtHandler The firewall was setup successfully: May 17 00:51:25.889409 waagent[1655]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) May 17 00:51:25.889409 waagent[1655]: pkts bytes target prot opt in out source destination May 17 00:51:25.889409 waagent[1655]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) May 17 00:51:25.889409 waagent[1655]: pkts bytes target prot opt in out source destination May 17 00:51:25.889409 waagent[1655]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) May 17 00:51:25.889409 waagent[1655]: pkts bytes target prot opt in out source destination May 17 00:51:25.889409 waagent[1655]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 May 17 00:51:25.889409 waagent[1655]: 4 595 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 May 17 00:51:25.889409 waagent[1655]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW May 17 00:51:25.890956 waagent[1655]: 2025-05-17T00:51:25.890898Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 May 17 00:51:27.463538 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 17 00:51:27.463723 systemd[1]: Stopped kubelet.service. May 17 00:51:27.465429 systemd[1]: Starting kubelet.service... May 17 00:51:27.889832 systemd[1]: Started kubelet.service. May 17 00:51:27.934756 kubelet[1705]: E0517 00:51:27.934691 1705 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:51:27.937187 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:51:27.937321 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:51:32.017584 kernel: hv_balloon: Max. dynamic memory size: 4096 MB May 17 00:51:37.963595 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. May 17 00:51:37.963798 systemd[1]: Stopped kubelet.service. May 17 00:51:37.965321 systemd[1]: Starting kubelet.service... May 17 00:51:38.192995 systemd[1]: Started kubelet.service. May 17 00:51:38.230360 kubelet[1714]: E0517 00:51:38.230258 1714 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:51:38.232868 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:51:38.233019 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:51:39.387274 systemd[1]: Created slice system-sshd.slice. May 17 00:51:39.389068 systemd[1]: Started sshd@0-10.200.20.32:22-10.200.16.10:48066.service. May 17 00:51:40.040910 sshd[1720]: Accepted publickey for core from 10.200.16.10 port 48066 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:51:40.058073 sshd[1720]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:51:40.062301 systemd-logind[1436]: New session 3 of user core. May 17 00:51:40.063417 systemd[1]: Started session-3.scope. May 17 00:51:40.459304 systemd[1]: Started sshd@1-10.200.20.32:22-10.200.16.10:48070.service. May 17 00:51:40.918357 sshd[1725]: Accepted publickey for core from 10.200.16.10 port 48070 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:51:40.920068 sshd[1725]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:51:40.924535 systemd[1]: Started session-4.scope. May 17 00:51:40.925811 systemd-logind[1436]: New session 4 of user core. May 17 00:51:41.261846 sshd[1725]: pam_unix(sshd:session): session closed for user core May 17 00:51:41.264823 systemd-logind[1436]: Session 4 logged out. Waiting for processes to exit. May 17 00:51:41.264842 systemd[1]: session-4.scope: Deactivated successfully. May 17 00:51:41.265431 systemd[1]: sshd@1-10.200.20.32:22-10.200.16.10:48070.service: Deactivated successfully. May 17 00:51:41.266484 systemd-logind[1436]: Removed session 4. May 17 00:51:41.341820 systemd[1]: Started sshd@2-10.200.20.32:22-10.200.16.10:48078.service. May 17 00:51:41.827347 sshd[1731]: Accepted publickey for core from 10.200.16.10 port 48078 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:51:41.828699 sshd[1731]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:51:41.836861 systemd-logind[1436]: New session 5 of user core. May 17 00:51:41.838155 systemd[1]: Started session-5.scope. May 17 00:51:42.175212 sshd[1731]: pam_unix(sshd:session): session closed for user core May 17 00:51:42.182109 systemd-logind[1436]: Session 5 logged out. Waiting for processes to exit. May 17 00:51:42.182399 systemd[1]: sshd@2-10.200.20.32:22-10.200.16.10:48078.service: Deactivated successfully. May 17 00:51:42.183427 systemd[1]: session-5.scope: Deactivated successfully. May 17 00:51:42.184126 systemd-logind[1436]: Removed session 5. May 17 00:51:42.266291 systemd[1]: Started sshd@3-10.200.20.32:22-10.200.16.10:48092.service. May 17 00:51:42.755146 sshd[1737]: Accepted publickey for core from 10.200.16.10 port 48092 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:51:42.757741 sshd[1737]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:51:42.762695 systemd-logind[1436]: New session 6 of user core. May 17 00:51:42.763762 systemd[1]: Started session-6.scope. May 17 00:51:43.104551 sshd[1737]: pam_unix(sshd:session): session closed for user core May 17 00:51:43.107186 systemd[1]: sshd@3-10.200.20.32:22-10.200.16.10:48092.service: Deactivated successfully. May 17 00:51:43.107888 systemd[1]: session-6.scope: Deactivated successfully. May 17 00:51:43.108652 systemd-logind[1436]: Session 6 logged out. Waiting for processes to exit. May 17 00:51:43.109475 systemd-logind[1436]: Removed session 6. May 17 00:51:43.180959 systemd[1]: Started sshd@4-10.200.20.32:22-10.200.16.10:48104.service. May 17 00:51:43.636598 sshd[1743]: Accepted publickey for core from 10.200.16.10 port 48104 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:51:43.638290 sshd[1743]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:51:43.642825 systemd[1]: Started session-7.scope. May 17 00:51:43.643428 systemd-logind[1436]: New session 7 of user core. May 17 00:51:44.188221 sudo[1746]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 17 00:51:44.188442 sudo[1746]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:51:44.228131 dbus-daemon[1423]: avc: received setenforce notice (enforcing=1) May 17 00:51:44.228351 sudo[1746]: pam_unix(sudo:session): session closed for user root May 17 00:51:44.326444 sshd[1743]: pam_unix(sshd:session): session closed for user core May 17 00:51:44.329862 systemd-logind[1436]: Session 7 logged out. Waiting for processes to exit. May 17 00:51:44.329914 systemd[1]: session-7.scope: Deactivated successfully. May 17 00:51:44.330522 systemd[1]: sshd@4-10.200.20.32:22-10.200.16.10:48104.service: Deactivated successfully. May 17 00:51:44.331574 systemd-logind[1436]: Removed session 7. May 17 00:51:44.402068 systemd[1]: Started sshd@5-10.200.20.32:22-10.200.16.10:48110.service. May 17 00:51:44.860202 sshd[1753]: Accepted publickey for core from 10.200.16.10 port 48110 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:51:44.861763 sshd[1753]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:51:44.866505 systemd-logind[1436]: New session 8 of user core. May 17 00:51:44.867059 systemd[1]: Started session-8.scope. May 17 00:51:45.119488 sudo[1757]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 17 00:51:45.119710 sudo[1757]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:51:45.122654 sudo[1757]: pam_unix(sudo:session): session closed for user root May 17 00:51:45.127632 sudo[1756]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 17 00:51:45.128319 sudo[1756]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:51:45.137892 systemd[1]: Stopping audit-rules.service... May 17 00:51:45.138000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 17 00:51:45.142983 kernel: kauditd_printk_skb: 2 callbacks suppressed May 17 00:51:45.143102 kernel: audit: type=1305 audit(1747443105.138:224): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 17 00:51:45.143361 auditctl[1760]: No rules May 17 00:51:45.143852 systemd[1]: audit-rules.service: Deactivated successfully. May 17 00:51:45.144059 systemd[1]: Stopped audit-rules.service. May 17 00:51:45.138000 audit[1760]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff1560780 a2=420 a3=0 items=0 ppid=1 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:45.155321 systemd[1]: Starting audit-rules.service... May 17 00:51:45.182267 kernel: audit: type=1300 audit(1747443105.138:224): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff1560780 a2=420 a3=0 items=0 ppid=1 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:45.138000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 17 00:51:45.193647 kernel: audit: type=1327 audit(1747443105.138:224): proctitle=2F7362696E2F617564697463746C002D44 May 17 00:51:45.143000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:51:45.212788 kernel: audit: type=1131 audit(1747443105.143:225): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:51:45.213375 augenrules[1777]: No rules May 17 00:51:45.214212 systemd[1]: Finished audit-rules.service. May 17 00:51:45.217465 sudo[1756]: pam_unix(sudo:session): session closed for user root May 17 00:51:45.213000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:51:45.216000 audit[1756]: USER_END pid=1756 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:51:45.255306 kernel: audit: type=1130 audit(1747443105.213:226): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:51:45.255395 kernel: audit: type=1106 audit(1747443105.216:227): pid=1756 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:51:45.216000 audit[1756]: CRED_DISP pid=1756 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:51:45.273831 kernel: audit: type=1104 audit(1747443105.216:228): pid=1756 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:51:45.325835 sshd[1753]: pam_unix(sshd:session): session closed for user core May 17 00:51:45.325000 audit[1753]: USER_END pid=1753 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:45.328987 systemd-logind[1436]: Session 8 logged out. Waiting for processes to exit. May 17 00:51:45.330230 systemd[1]: session-8.scope: Deactivated successfully. May 17 00:51:45.331335 systemd-logind[1436]: Removed session 8. May 17 00:51:45.331963 systemd[1]: sshd@5-10.200.20.32:22-10.200.16.10:48110.service: Deactivated successfully. May 17 00:51:45.326000 audit[1753]: CRED_DISP pid=1753 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:45.370844 kernel: audit: type=1106 audit(1747443105.325:229): pid=1753 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:45.370971 kernel: audit: type=1104 audit(1747443105.326:230): pid=1753 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:45.331000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.32:22-10.200.16.10:48110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:51:45.390239 kernel: audit: type=1131 audit(1747443105.331:231): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.32:22-10.200.16.10:48110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:51:45.408418 systemd[1]: Started sshd@6-10.200.20.32:22-10.200.16.10:48120.service. May 17 00:51:45.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.32:22-10.200.16.10:48120 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:51:45.887000 audit[1783]: USER_ACCT pid=1783 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:45.888235 sshd[1783]: Accepted publickey for core from 10.200.16.10 port 48120 ssh2: RSA SHA256:kTalk4vvVOHJD+odK+kI4Z4CxTmNI3TSVyFiPn8PnHg May 17 00:51:45.888000 audit[1783]: CRED_ACQ pid=1783 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:45.888000 audit[1783]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff7ce2060 a2=3 a3=1 items=0 ppid=1 pid=1783 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:45.888000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:51:45.889911 sshd[1783]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:51:45.894069 systemd-logind[1436]: New session 9 of user core. May 17 00:51:45.894515 systemd[1]: Started session-9.scope. May 17 00:51:45.897000 audit[1783]: USER_START pid=1783 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:45.899000 audit[1785]: CRED_ACQ pid=1785 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:46.156000 audit[1786]: USER_ACCT pid=1786 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:51:46.158093 sudo[1786]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 17 00:51:46.157000 audit[1786]: CRED_REFR pid=1786 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:51:46.158356 sudo[1786]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:51:46.159000 audit[1786]: USER_START pid=1786 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:51:46.171841 systemd[1]: Starting coreos-metadata.service... May 17 00:51:46.237884 coreos-metadata[1790]: May 17 00:51:46.237 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 May 17 00:51:46.242179 coreos-metadata[1790]: May 17 00:51:46.242 INFO Fetch successful May 17 00:51:46.242360 coreos-metadata[1790]: May 17 00:51:46.242 INFO Fetching http://168.63.129.16/machine/?comp=goalstate: Attempt #1 May 17 00:51:46.244139 coreos-metadata[1790]: May 17 00:51:46.244 INFO Fetch successful May 17 00:51:46.244443 coreos-metadata[1790]: May 17 00:51:46.244 INFO Fetching http://168.63.129.16/machine/d0abf6c3-f7df-4f11-a3ba-f21d763fc2a8/46a75052%2D88a7%2D4383%2Dbbe1%2Db196d5a69424.%5Fci%2D3510.3.7%2Dn%2Dcf89ee32d5?comp=config&type=sharedConfig&incarnation=1: Attempt #1 May 17 00:51:46.246310 coreos-metadata[1790]: May 17 00:51:46.246 INFO Fetch successful May 17 00:51:46.279784 coreos-metadata[1790]: May 17 00:51:46.279 INFO Fetching http://169.254.169.254/metadata/instance/compute/vmSize?api-version=2017-08-01&format=text: Attempt #1 May 17 00:51:46.290917 coreos-metadata[1790]: May 17 00:51:46.290 INFO Fetch successful May 17 00:51:46.300317 systemd[1]: Finished coreos-metadata.service. May 17 00:51:46.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:51:46.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:51:46.785000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:51:46.786250 systemd[1]: Stopped kubelet.service. May 17 00:51:46.788445 systemd[1]: Starting kubelet.service... May 17 00:51:46.819893 systemd[1]: Reloading. May 17 00:51:46.892876 /usr/lib/systemd/system-generators/torcx-generator[1846]: time="2025-05-17T00:51:46Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:51:46.895007 /usr/lib/systemd/system-generators/torcx-generator[1846]: time="2025-05-17T00:51:46Z" level=info msg="torcx already run" May 17 00:51:47.000472 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:51:47.000495 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:51:47.018738 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:51:47.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.091000 audit: BPF prog-id=47 op=LOAD May 17 00:51:47.091000 audit: BPF prog-id=39 op=UNLOAD May 17 00:51:47.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.091000 audit: BPF prog-id=48 op=LOAD May 17 00:51:47.091000 audit: BPF prog-id=30 op=UNLOAD May 17 00:51:47.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.091000 audit: BPF prog-id=49 op=LOAD May 17 00:51:47.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.092000 audit: BPF prog-id=50 op=LOAD May 17 00:51:47.092000 audit: BPF prog-id=31 op=UNLOAD May 17 00:51:47.092000 audit: BPF prog-id=32 op=UNLOAD May 17 00:51:47.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.093000 audit: BPF prog-id=51 op=LOAD May 17 00:51:47.093000 audit: BPF prog-id=46 op=UNLOAD May 17 00:51:47.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.093000 audit: BPF prog-id=52 op=LOAD May 17 00:51:47.093000 audit: BPF prog-id=34 op=UNLOAD May 17 00:51:47.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.093000 audit: BPF prog-id=53 op=LOAD May 17 00:51:47.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.094000 audit: BPF prog-id=54 op=LOAD May 17 00:51:47.094000 audit: BPF prog-id=35 op=UNLOAD May 17 00:51:47.094000 audit: BPF prog-id=36 op=UNLOAD May 17 00:51:47.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.094000 audit: BPF prog-id=55 op=LOAD May 17 00:51:47.094000 audit: BPF prog-id=40 op=UNLOAD May 17 00:51:47.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.096000 audit: BPF prog-id=56 op=LOAD May 17 00:51:47.096000 audit: BPF prog-id=44 op=UNLOAD May 17 00:51:47.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.098000 audit: BPF prog-id=57 op=LOAD May 17 00:51:47.098000 audit: BPF prog-id=41 op=UNLOAD May 17 00:51:47.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.098000 audit: BPF prog-id=58 op=LOAD May 17 00:51:47.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.098000 audit: BPF prog-id=59 op=LOAD May 17 00:51:47.098000 audit: BPF prog-id=42 op=UNLOAD May 17 00:51:47.098000 audit: BPF prog-id=43 op=UNLOAD May 17 00:51:47.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.099000 audit: BPF prog-id=60 op=LOAD May 17 00:51:47.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:47.099000 audit: BPF prog-id=61 op=LOAD May 17 00:51:47.099000 audit: BPF prog-id=37 op=UNLOAD May 17 00:51:47.099000 audit: BPF prog-id=38 op=UNLOAD May 17 00:51:47.113720 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM May 17 00:51:47.113799 systemd[1]: kubelet.service: Failed with result 'signal'. May 17 00:51:47.114101 systemd[1]: Stopped kubelet.service. May 17 00:51:47.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:51:47.115933 systemd[1]: Starting kubelet.service... May 17 00:51:47.315000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:51:47.316245 systemd[1]: Started kubelet.service. May 17 00:51:47.472021 kubelet[1912]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:51:47.472021 kubelet[1912]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 17 00:51:47.472021 kubelet[1912]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:51:47.472384 kubelet[1912]: I0517 00:51:47.472135 1912 server.go:212] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 17 00:51:48.935078 kubelet[1912]: I0517 00:51:48.934855 1912 server.go:530] "Kubelet version" kubeletVersion="v1.33.0" May 17 00:51:48.935078 kubelet[1912]: I0517 00:51:48.935075 1912 server.go:532] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 17 00:51:48.935526 kubelet[1912]: I0517 00:51:48.935511 1912 server.go:956] "Client rotation is on, will bootstrap in background" May 17 00:51:48.959977 kubelet[1912]: I0517 00:51:48.959944 1912 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 17 00:51:48.966422 kubelet[1912]: E0517 00:51:48.966381 1912 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 17 00:51:48.966610 kubelet[1912]: I0517 00:51:48.966594 1912 server.go:1423] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 17 00:51:48.969752 kubelet[1912]: I0517 00:51:48.969720 1912 server.go:782] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 17 00:51:48.971211 kubelet[1912]: I0517 00:51:48.971163 1912 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 17 00:51:48.971547 kubelet[1912]: I0517 00:51:48.971353 1912 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.200.20.32","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"MemoryManagerPolicy":"None","MemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 17 00:51:48.971707 kubelet[1912]: I0517 00:51:48.971692 1912 topology_manager.go:138] "Creating topology manager with none policy" May 17 00:51:48.971777 kubelet[1912]: I0517 00:51:48.971767 1912 container_manager_linux.go:303] "Creating device plugin manager" May 17 00:51:48.971989 kubelet[1912]: I0517 00:51:48.971974 1912 state_mem.go:36] "Initialized new in-memory state store" May 17 00:51:48.975116 kubelet[1912]: I0517 00:51:48.975092 1912 kubelet.go:480] "Attempting to sync node with API server" May 17 00:51:48.975306 kubelet[1912]: I0517 00:51:48.975290 1912 kubelet.go:375] "Adding static pod path" path="/etc/kubernetes/manifests" May 17 00:51:48.975409 kubelet[1912]: I0517 00:51:48.975398 1912 kubelet.go:386] "Adding apiserver pod source" May 17 00:51:48.976838 kubelet[1912]: I0517 00:51:48.976816 1912 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 17 00:51:48.977415 kubelet[1912]: E0517 00:51:48.977387 1912 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:51:48.977598 kubelet[1912]: E0517 00:51:48.977562 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:51:48.978450 kubelet[1912]: I0517 00:51:48.978433 1912 kuberuntime_manager.go:279] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 17 00:51:48.979355 kubelet[1912]: I0517 00:51:48.979334 1912 kubelet.go:935] "Not starting ClusterTrustBundle informer because we are in static kubelet mode or the ClusterTrustBundleProjection featuregate is disabled" May 17 00:51:48.979485 kubelet[1912]: W0517 00:51:48.979473 1912 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 17 00:51:48.981635 kubelet[1912]: I0517 00:51:48.981618 1912 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 17 00:51:48.981785 kubelet[1912]: I0517 00:51:48.981771 1912 server.go:1289] "Started kubelet" May 17 00:51:48.981000 audit[1912]: AVC avc: denied { mac_admin } for pid=1912 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:48.981000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:51:48.981000 audit[1912]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400099f320 a1=40009be828 a2=400099f2f0 a3=25 items=0 ppid=1 pid=1912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:48.981000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:51:48.983309 kubelet[1912]: I0517 00:51:48.983283 1912 kubelet.go:1552] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 17 00:51:48.982000 audit[1912]: AVC avc: denied { mac_admin } for pid=1912 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:48.982000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:51:48.982000 audit[1912]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40003b7940 a1=40009be840 a2=400099f3b0 a3=25 items=0 ppid=1 pid=1912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:48.982000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:51:48.983586 kubelet[1912]: I0517 00:51:48.983568 1912 kubelet.go:1556] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 17 00:51:48.983726 kubelet[1912]: I0517 00:51:48.983713 1912 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 17 00:51:48.989816 kubelet[1912]: E0517 00:51:48.989776 1912 reflector.go:200] "Failed to watch" err="failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" May 17 00:51:48.990809 kubelet[1912]: E0517 00:51:48.989835 1912 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.200.20.32.18402a3fd00f4275 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.200.20.32,UID:10.200.20.32,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:10.200.20.32,},FirstTimestamp:2025-05-17 00:51:48.981719669 +0000 UTC m=+1.660572105,LastTimestamp:2025-05-17 00:51:48.981719669 +0000 UTC m=+1.660572105,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.200.20.32,}" May 17 00:51:48.991379 kubelet[1912]: E0517 00:51:48.991307 1912 reflector.go:200] "Failed to watch" err="failed to list *v1.Node: nodes \"10.200.20.32\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Node" May 17 00:51:48.992589 kubelet[1912]: E0517 00:51:48.992551 1912 kubelet.go:1600] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 17 00:51:48.993043 kubelet[1912]: I0517 00:51:48.992956 1912 server.go:180] "Starting to listen" address="0.0.0.0" port=10250 May 17 00:51:48.992000 audit[1927]: NETFILTER_CFG table=mangle:7 family=2 entries=2 op=nft_register_chain pid=1927 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:51:48.992000 audit[1927]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffee50afe0 a2=0 a3=1 items=0 ppid=1912 pid=1927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:48.992000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 00:51:48.993933 kubelet[1912]: I0517 00:51:48.993805 1912 server.go:317] "Adding debug handlers to kubelet server" May 17 00:51:48.994398 kubelet[1912]: I0517 00:51:48.994378 1912 volume_manager.go:297] "Starting Kubelet Volume Manager" May 17 00:51:48.995080 kubelet[1912]: E0517 00:51:48.995055 1912 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.32\" not found" May 17 00:51:48.995919 kubelet[1912]: I0517 00:51:48.995898 1912 desired_state_of_world_populator.go:150] "Desired state populator starts to run" May 17 00:51:48.996219 kubelet[1912]: I0517 00:51:48.996206 1912 reconciler.go:26] "Reconciler: start to sync state" May 17 00:51:48.997000 audit[1930]: NETFILTER_CFG table=filter:8 family=2 entries=2 op=nft_register_chain pid=1930 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:51:48.997000 audit[1930]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffcd94c0b0 a2=0 a3=1 items=0 ppid=1912 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:48.997000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 00:51:48.998380 kubelet[1912]: I0517 00:51:48.998231 1912 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 17 00:51:48.998489 kubelet[1912]: I0517 00:51:48.998465 1912 server.go:255] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 17 00:51:48.998716 kubelet[1912]: I0517 00:51:48.998684 1912 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 17 00:51:48.999000 audit[1932]: NETFILTER_CFG table=filter:9 family=2 entries=2 op=nft_register_chain pid=1932 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:51:48.999000 audit[1932]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffd15b8460 a2=0 a3=1 items=0 ppid=1912 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:48.999000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:51:49.003000 audit[1934]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1934 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:51:49.003000 audit[1934]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffff68d8d10 a2=0 a3=1 items=0 ppid=1912 pid=1934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:49.003000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:51:49.006400 kubelet[1912]: I0517 00:51:49.006374 1912 factory.go:223] Registration of the systemd container factory successfully May 17 00:51:49.006657 kubelet[1912]: I0517 00:51:49.006634 1912 factory.go:221] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 17 00:51:49.009796 kubelet[1912]: E0517 00:51:49.009771 1912 reflector.go:200] "Failed to watch" err="failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User \"system:anonymous\" cannot list resource \"csidrivers\" in API group \"storage.k8s.io\" at the cluster scope" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" May 17 00:51:49.011059 kubelet[1912]: I0517 00:51:49.010985 1912 factory.go:223] Registration of the containerd container factory successfully May 17 00:51:49.021277 kubelet[1912]: E0517 00:51:49.021219 1912 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.200.20.32\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" May 17 00:51:49.021795 kubelet[1912]: E0517 00:51:49.021606 1912 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.200.20.32.18402a3fd0b41452 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.200.20.32,UID:10.200.20.32,APIVersion:,ResourceVersion:,FieldPath:,},Reason:InvalidDiskCapacity,Message:invalid capacity 0 on image filesystem,Source:EventSource{Component:kubelet,Host:10.200.20.32,},FirstTimestamp:2025-05-17 00:51:48.992521298 +0000 UTC m=+1.671373734,LastTimestamp:2025-05-17 00:51:48.992521298 +0000 UTC m=+1.671373734,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.200.20.32,}" May 17 00:51:49.023331 kubelet[1912]: I0517 00:51:49.023299 1912 cpu_manager.go:221] "Starting CPU manager" policy="none" May 17 00:51:49.023460 kubelet[1912]: I0517 00:51:49.023445 1912 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 17 00:51:49.023547 kubelet[1912]: I0517 00:51:49.023536 1912 state_mem.go:36] "Initialized new in-memory state store" May 17 00:51:49.024074 kubelet[1912]: E0517 00:51:49.023900 1912 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.200.20.32.18402a3fd27cd136 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.200.20.32,UID:10.200.20.32,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientMemory,Message:Node 10.200.20.32 status is now: NodeHasSufficientMemory,Source:EventSource{Component:kubelet,Host:10.200.20.32,},FirstTimestamp:2025-05-17 00:51:49.02245407 +0000 UTC m=+1.701306506,LastTimestamp:2025-05-17 00:51:49.02245407 +0000 UTC m=+1.701306506,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.200.20.32,}" May 17 00:51:49.028005 kubelet[1912]: I0517 00:51:49.027971 1912 policy_none.go:49] "None policy: Start" May 17 00:51:49.028086 kubelet[1912]: I0517 00:51:49.028014 1912 memory_manager.go:186] "Starting memorymanager" policy="None" May 17 00:51:49.028086 kubelet[1912]: I0517 00:51:49.028030 1912 state_mem.go:35] "Initializing new in-memory state store" May 17 00:51:49.035521 systemd[1]: Created slice kubepods.slice. May 17 00:51:49.041968 systemd[1]: Created slice kubepods-burstable.slice. May 17 00:51:49.045203 systemd[1]: Created slice kubepods-besteffort.slice. May 17 00:51:49.049779 kubelet[1912]: E0517 00:51:49.049734 1912 manager.go:517] "Failed to read data from checkpoint" err="checkpoint is not found" checkpoint="kubelet_internal_checkpoint" May 17 00:51:49.048000 audit[1912]: AVC avc: denied { mac_admin } for pid=1912 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:49.048000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:51:49.048000 audit[1912]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000c65620 a1=4000e224f8 a2=4000c655f0 a3=25 items=0 ppid=1 pid=1912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:49.048000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:51:49.050079 kubelet[1912]: E0517 00:51:49.049847 1912 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" path="/var/lib/kubelet/device-plugins/" May 17 00:51:49.050079 kubelet[1912]: I0517 00:51:49.049989 1912 eviction_manager.go:189] "Eviction manager: starting control loop" May 17 00:51:49.050079 kubelet[1912]: I0517 00:51:49.050026 1912 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 17 00:51:49.051224 kubelet[1912]: I0517 00:51:49.050618 1912 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 17 00:51:49.052522 kubelet[1912]: E0517 00:51:49.052494 1912 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 17 00:51:49.052654 kubelet[1912]: E0517 00:51:49.052534 1912 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.200.20.32\" not found" May 17 00:51:49.087000 audit[1940]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_rule pid=1940 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:51:49.087000 audit[1940]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=fffff6cc3870 a2=0 a3=1 items=0 ppid=1912 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:49.087000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 17 00:51:49.089628 kubelet[1912]: I0517 00:51:49.089026 1912 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv4" May 17 00:51:49.089000 audit[1942]: NETFILTER_CFG table=mangle:12 family=10 entries=2 op=nft_register_chain pid=1942 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:51:49.089000 audit[1942]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffca917630 a2=0 a3=1 items=0 ppid=1912 pid=1942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:49.089000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 00:51:49.090731 kubelet[1912]: I0517 00:51:49.090690 1912 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv6" May 17 00:51:49.090731 kubelet[1912]: I0517 00:51:49.090729 1912 status_manager.go:230] "Starting to sync pod status with apiserver" May 17 00:51:49.090811 kubelet[1912]: I0517 00:51:49.090753 1912 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 17 00:51:49.090811 kubelet[1912]: I0517 00:51:49.090761 1912 kubelet.go:2436] "Starting kubelet main sync loop" May 17 00:51:49.090892 kubelet[1912]: E0517 00:51:49.090864 1912 kubelet.go:2460] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" May 17 00:51:49.090000 audit[1943]: NETFILTER_CFG table=mangle:13 family=2 entries=1 op=nft_register_chain pid=1943 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:51:49.090000 audit[1943]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd4851b40 a2=0 a3=1 items=0 ppid=1912 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:49.090000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 00:51:49.091000 audit[1944]: NETFILTER_CFG table=mangle:14 family=10 entries=1 op=nft_register_chain pid=1944 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:51:49.091000 audit[1944]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd271a8f0 a2=0 a3=1 items=0 ppid=1912 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:49.091000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 00:51:49.093000 audit[1946]: NETFILTER_CFG table=nat:15 family=10 entries=2 op=nft_register_chain pid=1946 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:51:49.093000 audit[1946]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffcface220 a2=0 a3=1 items=0 ppid=1912 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:49.093000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 00:51:49.093000 audit[1945]: NETFILTER_CFG table=nat:16 family=2 entries=2 op=nft_register_chain pid=1945 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:51:49.093000 audit[1945]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffe0ea8f20 a2=0 a3=1 items=0 ppid=1912 pid=1945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:49.093000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 00:51:49.094000 audit[1947]: NETFILTER_CFG table=filter:17 family=2 entries=1 op=nft_register_chain pid=1947 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:51:49.094000 audit[1947]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc57c5350 a2=0 a3=1 items=0 ppid=1912 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:49.094000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 00:51:49.095000 audit[1948]: NETFILTER_CFG table=filter:18 family=10 entries=2 op=nft_register_chain pid=1948 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:51:49.095000 audit[1948]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffd4999d50 a2=0 a3=1 items=0 ppid=1912 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:49.095000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 00:51:49.151201 kubelet[1912]: I0517 00:51:49.151149 1912 kubelet_node_status.go:75] "Attempting to register node" node="10.200.20.32" May 17 00:51:49.156860 kubelet[1912]: I0517 00:51:49.156833 1912 kubelet_node_status.go:78] "Successfully registered node" node="10.200.20.32" May 17 00:51:49.157045 kubelet[1912]: E0517 00:51:49.157030 1912 kubelet_node_status.go:548] "Error updating node status, will retry" err="error getting node \"10.200.20.32\": node \"10.200.20.32\" not found" May 17 00:51:49.178694 kubelet[1912]: I0517 00:51:49.178659 1912 kuberuntime_manager.go:1746] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" May 17 00:51:49.179495 env[1446]: time="2025-05-17T00:51:49.179377884Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 17 00:51:49.179975 kubelet[1912]: I0517 00:51:49.179953 1912 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" May 17 00:51:49.203369 kubelet[1912]: E0517 00:51:49.200990 1912 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.32\" not found" May 17 00:51:49.304236 kubelet[1912]: E0517 00:51:49.304164 1912 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.32\" not found" May 17 00:51:49.352937 sudo[1786]: pam_unix(sudo:session): session closed for user root May 17 00:51:49.351000 audit[1786]: USER_END pid=1786 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:51:49.352000 audit[1786]: CRED_DISP pid=1786 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:51:49.404727 kubelet[1912]: E0517 00:51:49.404677 1912 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.32\" not found" May 17 00:51:49.443653 sshd[1783]: pam_unix(sshd:session): session closed for user core May 17 00:51:49.443000 audit[1783]: USER_END pid=1783 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:49.443000 audit[1783]: CRED_DISP pid=1783 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:51:49.446398 systemd[1]: sshd@6-10.200.20.32:22-10.200.16.10:48120.service: Deactivated successfully. May 17 00:51:49.445000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.32:22-10.200.16.10:48120 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:51:49.446555 systemd-logind[1436]: Session 9 logged out. Waiting for processes to exit. May 17 00:51:49.447084 systemd[1]: session-9.scope: Deactivated successfully. May 17 00:51:49.447892 systemd-logind[1436]: Removed session 9. May 17 00:51:49.505484 kubelet[1912]: E0517 00:51:49.505444 1912 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.32\" not found" May 17 00:51:49.606022 kubelet[1912]: E0517 00:51:49.605956 1912 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.32\" not found" May 17 00:51:49.706490 kubelet[1912]: E0517 00:51:49.706448 1912 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.32\" not found" May 17 00:51:49.807340 kubelet[1912]: E0517 00:51:49.807215 1912 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.32\" not found" May 17 00:51:49.907504 kubelet[1912]: E0517 00:51:49.907469 1912 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.32\" not found" May 17 00:51:49.937980 kubelet[1912]: I0517 00:51:49.937932 1912 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" May 17 00:51:49.938574 kubelet[1912]: I0517 00:51:49.938544 1912 reflector.go:556] "Warning: watch ended with error" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.RuntimeClass" err="very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received" May 17 00:51:49.938725 kubelet[1912]: I0517 00:51:49.938696 1912 reflector.go:556] "Warning: watch ended with error" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" err="very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received" May 17 00:51:49.978541 kubelet[1912]: E0517 00:51:49.978484 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:51:50.008224 kubelet[1912]: E0517 00:51:50.008192 1912 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.32\" not found" May 17 00:51:50.109627 kubelet[1912]: E0517 00:51:50.109303 1912 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.32\" not found" May 17 00:51:50.209873 kubelet[1912]: E0517 00:51:50.209824 1912 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.32\" not found" May 17 00:51:50.310433 kubelet[1912]: E0517 00:51:50.310393 1912 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.32\" not found" May 17 00:51:50.979056 kubelet[1912]: I0517 00:51:50.978994 1912 apiserver.go:52] "Watching apiserver" May 17 00:51:50.979432 kubelet[1912]: E0517 00:51:50.979359 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:51:51.008726 kubelet[1912]: I0517 00:51:51.008698 1912 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-k5zq7\" (UniqueName: \"kubernetes.io/projected/4cc24172-5507-4fc1-8247-847bf32858ba-kube-api-access-k5zq7\") pod \"calico-node-x2hlm\" (UID: \"4cc24172-5507-4fc1-8247-847bf32858ba\") " pod="calico-system/calico-node-x2hlm" May 17 00:51:51.008947 kubelet[1912]: I0517 00:51:51.008929 1912 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/4cc24172-5507-4fc1-8247-847bf32858ba-cni-net-dir\") pod \"calico-node-x2hlm\" (UID: \"4cc24172-5507-4fc1-8247-847bf32858ba\") " pod="calico-system/calico-node-x2hlm" May 17 00:51:51.009069 kubelet[1912]: I0517 00:51:51.009054 1912 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/4cc24172-5507-4fc1-8247-847bf32858ba-lib-modules\") pod \"calico-node-x2hlm\" (UID: \"4cc24172-5507-4fc1-8247-847bf32858ba\") " pod="calico-system/calico-node-x2hlm" May 17 00:51:51.009223 kubelet[1912]: I0517 00:51:51.009207 1912 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/4cc24172-5507-4fc1-8247-847bf32858ba-tigera-ca-bundle\") pod \"calico-node-x2hlm\" (UID: \"4cc24172-5507-4fc1-8247-847bf32858ba\") " pod="calico-system/calico-node-x2hlm" May 17 00:51:51.009308 kubelet[1912]: I0517 00:51:51.009296 1912 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/4cc24172-5507-4fc1-8247-847bf32858ba-var-lib-calico\") pod \"calico-node-x2hlm\" (UID: \"4cc24172-5507-4fc1-8247-847bf32858ba\") " pod="calico-system/calico-node-x2hlm" May 17 00:51:51.009398 kubelet[1912]: I0517 00:51:51.009376 1912 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/4cc24172-5507-4fc1-8247-847bf32858ba-xtables-lock\") pod \"calico-node-x2hlm\" (UID: \"4cc24172-5507-4fc1-8247-847bf32858ba\") " pod="calico-system/calico-node-x2hlm" May 17 00:51:51.009473 kubelet[1912]: I0517 00:51:51.009461 1912 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/4cc24172-5507-4fc1-8247-847bf32858ba-cni-bin-dir\") pod \"calico-node-x2hlm\" (UID: \"4cc24172-5507-4fc1-8247-847bf32858ba\") " pod="calico-system/calico-node-x2hlm" May 17 00:51:51.009541 kubelet[1912]: I0517 00:51:51.009529 1912 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/4cc24172-5507-4fc1-8247-847bf32858ba-cni-log-dir\") pod \"calico-node-x2hlm\" (UID: \"4cc24172-5507-4fc1-8247-847bf32858ba\") " pod="calico-system/calico-node-x2hlm" May 17 00:51:51.009612 kubelet[1912]: I0517 00:51:51.009600 1912 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/4cc24172-5507-4fc1-8247-847bf32858ba-flexvol-driver-host\") pod \"calico-node-x2hlm\" (UID: \"4cc24172-5507-4fc1-8247-847bf32858ba\") " pod="calico-system/calico-node-x2hlm" May 17 00:51:51.009684 kubelet[1912]: I0517 00:51:51.009672 1912 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/4cc24172-5507-4fc1-8247-847bf32858ba-node-certs\") pod \"calico-node-x2hlm\" (UID: \"4cc24172-5507-4fc1-8247-847bf32858ba\") " pod="calico-system/calico-node-x2hlm" May 17 00:51:51.009841 kubelet[1912]: I0517 00:51:51.009827 1912 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/4cc24172-5507-4fc1-8247-847bf32858ba-policysync\") pod \"calico-node-x2hlm\" (UID: \"4cc24172-5507-4fc1-8247-847bf32858ba\") " pod="calico-system/calico-node-x2hlm" May 17 00:51:51.009926 kubelet[1912]: I0517 00:51:51.009914 1912 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/4cc24172-5507-4fc1-8247-847bf32858ba-var-run-calico\") pod \"calico-node-x2hlm\" (UID: \"4cc24172-5507-4fc1-8247-847bf32858ba\") " pod="calico-system/calico-node-x2hlm" May 17 00:51:51.016475 kubelet[1912]: E0517 00:51:51.016432 1912 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-92l2r" podUID="1f904db8-53aa-4690-87de-f3596ea62196" May 17 00:51:51.019134 systemd[1]: Created slice kubepods-besteffort-pod4cc24172_5507_4fc1_8247_847bf32858ba.slice. May 17 00:51:51.030834 systemd[1]: Created slice kubepods-besteffort-podf173c63b_fd11_4cf8_a8fe_caa75f3210f3.slice. May 17 00:51:51.096678 kubelet[1912]: I0517 00:51:51.096638 1912 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" May 17 00:51:51.111386 kubelet[1912]: I0517 00:51:51.111343 1912 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lwpnn\" (UniqueName: \"kubernetes.io/projected/f173c63b-fd11-4cf8-a8fe-caa75f3210f3-kube-api-access-lwpnn\") pod \"kube-proxy-xrm4g\" (UID: \"f173c63b-fd11-4cf8-a8fe-caa75f3210f3\") " pod="kube-system/kube-proxy-xrm4g" May 17 00:51:51.111386 kubelet[1912]: I0517 00:51:51.111395 1912 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hzzr4\" (UniqueName: \"kubernetes.io/projected/1f904db8-53aa-4690-87de-f3596ea62196-kube-api-access-hzzr4\") pod \"csi-node-driver-92l2r\" (UID: \"1f904db8-53aa-4690-87de-f3596ea62196\") " pod="calico-system/csi-node-driver-92l2r" May 17 00:51:51.111562 kubelet[1912]: I0517 00:51:51.111444 1912 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/f173c63b-fd11-4cf8-a8fe-caa75f3210f3-kube-proxy\") pod \"kube-proxy-xrm4g\" (UID: \"f173c63b-fd11-4cf8-a8fe-caa75f3210f3\") " pod="kube-system/kube-proxy-xrm4g" May 17 00:51:51.111562 kubelet[1912]: I0517 00:51:51.111465 1912 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/1f904db8-53aa-4690-87de-f3596ea62196-socket-dir\") pod \"csi-node-driver-92l2r\" (UID: \"1f904db8-53aa-4690-87de-f3596ea62196\") " pod="calico-system/csi-node-driver-92l2r" May 17 00:51:51.111562 kubelet[1912]: I0517 00:51:51.111519 1912 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/f173c63b-fd11-4cf8-a8fe-caa75f3210f3-xtables-lock\") pod \"kube-proxy-xrm4g\" (UID: \"f173c63b-fd11-4cf8-a8fe-caa75f3210f3\") " pod="kube-system/kube-proxy-xrm4g" May 17 00:51:51.111562 kubelet[1912]: I0517 00:51:51.111534 1912 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/f173c63b-fd11-4cf8-a8fe-caa75f3210f3-lib-modules\") pod \"kube-proxy-xrm4g\" (UID: \"f173c63b-fd11-4cf8-a8fe-caa75f3210f3\") " pod="kube-system/kube-proxy-xrm4g" May 17 00:51:51.111562 kubelet[1912]: I0517 00:51:51.111549 1912 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/1f904db8-53aa-4690-87de-f3596ea62196-registration-dir\") pod \"csi-node-driver-92l2r\" (UID: \"1f904db8-53aa-4690-87de-f3596ea62196\") " pod="calico-system/csi-node-driver-92l2r" May 17 00:51:51.111690 kubelet[1912]: I0517 00:51:51.111591 1912 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/1f904db8-53aa-4690-87de-f3596ea62196-kubelet-dir\") pod \"csi-node-driver-92l2r\" (UID: \"1f904db8-53aa-4690-87de-f3596ea62196\") " pod="calico-system/csi-node-driver-92l2r" May 17 00:51:51.111690 kubelet[1912]: I0517 00:51:51.111606 1912 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/1f904db8-53aa-4690-87de-f3596ea62196-varrun\") pod \"csi-node-driver-92l2r\" (UID: \"1f904db8-53aa-4690-87de-f3596ea62196\") " pod="calico-system/csi-node-driver-92l2r" May 17 00:51:51.111836 kubelet[1912]: I0517 00:51:51.111355 1912 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 17 00:51:51.113427 kubelet[1912]: E0517 00:51:51.113385 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.113427 kubelet[1912]: W0517 00:51:51.113411 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.113427 kubelet[1912]: E0517 00:51:51.113431 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.113636 kubelet[1912]: E0517 00:51:51.113603 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.113636 kubelet[1912]: W0517 00:51:51.113612 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.113636 kubelet[1912]: E0517 00:51:51.113621 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.113636 kubelet[1912]: E0517 00:51:51.113752 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.113918 kubelet[1912]: W0517 00:51:51.113798 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.113918 kubelet[1912]: E0517 00:51:51.113807 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.114035 kubelet[1912]: E0517 00:51:51.113994 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.114035 kubelet[1912]: W0517 00:51:51.114034 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.114113 kubelet[1912]: E0517 00:51:51.114044 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.114230 kubelet[1912]: E0517 00:51:51.114207 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.114230 kubelet[1912]: W0517 00:51:51.114221 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.114230 kubelet[1912]: E0517 00:51:51.114229 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.114382 kubelet[1912]: E0517 00:51:51.114364 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.114382 kubelet[1912]: W0517 00:51:51.114376 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.114449 kubelet[1912]: E0517 00:51:51.114385 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.114531 kubelet[1912]: E0517 00:51:51.114513 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.114531 kubelet[1912]: W0517 00:51:51.114526 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.114601 kubelet[1912]: E0517 00:51:51.114534 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.114818 kubelet[1912]: E0517 00:51:51.114738 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.114818 kubelet[1912]: W0517 00:51:51.114762 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.114818 kubelet[1912]: E0517 00:51:51.114771 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.114933 kubelet[1912]: E0517 00:51:51.114913 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.114933 kubelet[1912]: W0517 00:51:51.114927 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.115067 kubelet[1912]: E0517 00:51:51.114936 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.115126 kubelet[1912]: E0517 00:51:51.115107 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.115126 kubelet[1912]: W0517 00:51:51.115122 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.115189 kubelet[1912]: E0517 00:51:51.115132 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.115298 kubelet[1912]: E0517 00:51:51.115275 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.115298 kubelet[1912]: W0517 00:51:51.115287 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.115298 kubelet[1912]: E0517 00:51:51.115296 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.115467 kubelet[1912]: E0517 00:51:51.115442 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.115467 kubelet[1912]: W0517 00:51:51.115455 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.115467 kubelet[1912]: E0517 00:51:51.115463 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.115613 kubelet[1912]: E0517 00:51:51.115593 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.115613 kubelet[1912]: W0517 00:51:51.115605 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.115690 kubelet[1912]: E0517 00:51:51.115614 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.115873 kubelet[1912]: E0517 00:51:51.115751 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.115873 kubelet[1912]: W0517 00:51:51.115779 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.115873 kubelet[1912]: E0517 00:51:51.115788 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.115966 kubelet[1912]: E0517 00:51:51.115929 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.115966 kubelet[1912]: W0517 00:51:51.115937 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.115966 kubelet[1912]: E0517 00:51:51.115945 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.116473 kubelet[1912]: E0517 00:51:51.116450 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.116473 kubelet[1912]: W0517 00:51:51.116468 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.116828 kubelet[1912]: E0517 00:51:51.116483 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.116828 kubelet[1912]: E0517 00:51:51.116649 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.116828 kubelet[1912]: W0517 00:51:51.116658 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.116828 kubelet[1912]: E0517 00:51:51.116667 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.116828 kubelet[1912]: E0517 00:51:51.116809 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.116828 kubelet[1912]: W0517 00:51:51.116816 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.116828 kubelet[1912]: E0517 00:51:51.116823 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.124552 kubelet[1912]: E0517 00:51:51.124520 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.124722 kubelet[1912]: W0517 00:51:51.124705 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.124835 kubelet[1912]: E0517 00:51:51.124821 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.126791 kubelet[1912]: E0517 00:51:51.126768 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.126940 kubelet[1912]: W0517 00:51:51.126925 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.127038 kubelet[1912]: E0517 00:51:51.127025 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.212419 kubelet[1912]: E0517 00:51:51.212379 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.212419 kubelet[1912]: W0517 00:51:51.212409 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.212608 kubelet[1912]: E0517 00:51:51.212432 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.212639 kubelet[1912]: E0517 00:51:51.212623 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.212639 kubelet[1912]: W0517 00:51:51.212632 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.212684 kubelet[1912]: E0517 00:51:51.212644 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.212825 kubelet[1912]: E0517 00:51:51.212808 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.212825 kubelet[1912]: W0517 00:51:51.212822 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.212902 kubelet[1912]: E0517 00:51:51.212831 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.213050 kubelet[1912]: E0517 00:51:51.213033 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.213050 kubelet[1912]: W0517 00:51:51.213047 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.213124 kubelet[1912]: E0517 00:51:51.213057 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.213242 kubelet[1912]: E0517 00:51:51.213227 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.213242 kubelet[1912]: W0517 00:51:51.213240 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.213310 kubelet[1912]: E0517 00:51:51.213250 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.213421 kubelet[1912]: E0517 00:51:51.213404 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.213421 kubelet[1912]: W0517 00:51:51.213419 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.213476 kubelet[1912]: E0517 00:51:51.213428 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.213586 kubelet[1912]: E0517 00:51:51.213570 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.213586 kubelet[1912]: W0517 00:51:51.213584 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.213643 kubelet[1912]: E0517 00:51:51.213593 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.213798 kubelet[1912]: E0517 00:51:51.213762 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.213798 kubelet[1912]: W0517 00:51:51.213789 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.213851 kubelet[1912]: E0517 00:51:51.213798 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.213975 kubelet[1912]: E0517 00:51:51.213959 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.213975 kubelet[1912]: W0517 00:51:51.213973 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.214065 kubelet[1912]: E0517 00:51:51.213982 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.214200 kubelet[1912]: E0517 00:51:51.214186 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.214237 kubelet[1912]: W0517 00:51:51.214198 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.214237 kubelet[1912]: E0517 00:51:51.214215 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.214393 kubelet[1912]: E0517 00:51:51.214378 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.214393 kubelet[1912]: W0517 00:51:51.214392 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.214461 kubelet[1912]: E0517 00:51:51.214400 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.214560 kubelet[1912]: E0517 00:51:51.214544 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.214560 kubelet[1912]: W0517 00:51:51.214557 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.214614 kubelet[1912]: E0517 00:51:51.214565 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.214713 kubelet[1912]: E0517 00:51:51.214692 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.214713 kubelet[1912]: W0517 00:51:51.214711 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.214788 kubelet[1912]: E0517 00:51:51.214720 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.214860 kubelet[1912]: E0517 00:51:51.214843 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.214860 kubelet[1912]: W0517 00:51:51.214859 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.214914 kubelet[1912]: E0517 00:51:51.214869 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.215041 kubelet[1912]: E0517 00:51:51.215026 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.215041 kubelet[1912]: W0517 00:51:51.215039 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.215123 kubelet[1912]: E0517 00:51:51.215051 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.215232 kubelet[1912]: E0517 00:51:51.215208 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.215232 kubelet[1912]: W0517 00:51:51.215227 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.215302 kubelet[1912]: E0517 00:51:51.215236 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.215390 kubelet[1912]: E0517 00:51:51.215377 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.215390 kubelet[1912]: W0517 00:51:51.215388 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.215465 kubelet[1912]: E0517 00:51:51.215397 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.215553 kubelet[1912]: E0517 00:51:51.215538 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.215553 kubelet[1912]: W0517 00:51:51.215551 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.215615 kubelet[1912]: E0517 00:51:51.215559 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.215716 kubelet[1912]: E0517 00:51:51.215703 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.215716 kubelet[1912]: W0517 00:51:51.215714 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.215806 kubelet[1912]: E0517 00:51:51.215723 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.215899 kubelet[1912]: E0517 00:51:51.215885 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.215899 kubelet[1912]: W0517 00:51:51.215898 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.215973 kubelet[1912]: E0517 00:51:51.215907 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.216110 kubelet[1912]: E0517 00:51:51.216096 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.216144 kubelet[1912]: W0517 00:51:51.216110 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.216144 kubelet[1912]: E0517 00:51:51.216125 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.216343 kubelet[1912]: E0517 00:51:51.216326 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.216343 kubelet[1912]: W0517 00:51:51.216339 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.216419 kubelet[1912]: E0517 00:51:51.216349 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.216506 kubelet[1912]: E0517 00:51:51.216488 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.216506 kubelet[1912]: W0517 00:51:51.216501 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.216586 kubelet[1912]: E0517 00:51:51.216510 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.216682 kubelet[1912]: E0517 00:51:51.216668 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.216682 kubelet[1912]: W0517 00:51:51.216679 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.216762 kubelet[1912]: E0517 00:51:51.216688 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.216865 kubelet[1912]: E0517 00:51:51.216850 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.216865 kubelet[1912]: W0517 00:51:51.216864 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.216931 kubelet[1912]: E0517 00:51:51.216872 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.217064 kubelet[1912]: E0517 00:51:51.217049 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.217064 kubelet[1912]: W0517 00:51:51.217062 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.217136 kubelet[1912]: E0517 00:51:51.217074 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.217242 kubelet[1912]: E0517 00:51:51.217229 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.217242 kubelet[1912]: W0517 00:51:51.217241 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.217318 kubelet[1912]: E0517 00:51:51.217250 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.217398 kubelet[1912]: E0517 00:51:51.217378 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.217398 kubelet[1912]: W0517 00:51:51.217396 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.217466 kubelet[1912]: E0517 00:51:51.217405 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.217562 kubelet[1912]: E0517 00:51:51.217548 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.217562 kubelet[1912]: W0517 00:51:51.217560 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.217641 kubelet[1912]: E0517 00:51:51.217569 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.217727 kubelet[1912]: E0517 00:51:51.217714 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.217727 kubelet[1912]: W0517 00:51:51.217725 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.217786 kubelet[1912]: E0517 00:51:51.217735 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.217904 kubelet[1912]: E0517 00:51:51.217891 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.217904 kubelet[1912]: W0517 00:51:51.217902 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.217969 kubelet[1912]: E0517 00:51:51.217911 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.218195 kubelet[1912]: E0517 00:51:51.218176 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.218195 kubelet[1912]: W0517 00:51:51.218191 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.218257 kubelet[1912]: E0517 00:51:51.218201 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.218339 kubelet[1912]: E0517 00:51:51.218321 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.218339 kubelet[1912]: W0517 00:51:51.218333 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.218401 kubelet[1912]: E0517 00:51:51.218347 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.218475 kubelet[1912]: E0517 00:51:51.218458 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.218475 kubelet[1912]: W0517 00:51:51.218470 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.218531 kubelet[1912]: E0517 00:51:51.218478 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.218619 kubelet[1912]: E0517 00:51:51.218601 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.218619 kubelet[1912]: W0517 00:51:51.218613 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.218680 kubelet[1912]: E0517 00:51:51.218620 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.218741 kubelet[1912]: E0517 00:51:51.218726 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.218741 kubelet[1912]: W0517 00:51:51.218736 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.218800 kubelet[1912]: E0517 00:51:51.218744 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.218863 kubelet[1912]: E0517 00:51:51.218847 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.218863 kubelet[1912]: W0517 00:51:51.218858 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.218916 kubelet[1912]: E0517 00:51:51.218867 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.219046 kubelet[1912]: E0517 00:51:51.219030 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.219046 kubelet[1912]: W0517 00:51:51.219044 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.219122 kubelet[1912]: E0517 00:51:51.219053 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.219643 kubelet[1912]: E0517 00:51:51.219621 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.219643 kubelet[1912]: W0517 00:51:51.219640 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.219708 kubelet[1912]: E0517 00:51:51.219652 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.219890 kubelet[1912]: E0517 00:51:51.219873 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.219947 kubelet[1912]: W0517 00:51:51.219892 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.219947 kubelet[1912]: E0517 00:51:51.219902 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.220196 kubelet[1912]: E0517 00:51:51.220180 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.220196 kubelet[1912]: W0517 00:51:51.220194 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.220249 kubelet[1912]: E0517 00:51:51.220206 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.220399 kubelet[1912]: E0517 00:51:51.220382 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.220399 kubelet[1912]: W0517 00:51:51.220397 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.220468 kubelet[1912]: E0517 00:51:51.220407 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.220579 kubelet[1912]: E0517 00:51:51.220565 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.220579 kubelet[1912]: W0517 00:51:51.220578 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.220634 kubelet[1912]: E0517 00:51:51.220586 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.220767 kubelet[1912]: E0517 00:51:51.220742 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.220767 kubelet[1912]: W0517 00:51:51.220761 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.220822 kubelet[1912]: E0517 00:51:51.220770 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.221281 kubelet[1912]: E0517 00:51:51.221262 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.221281 kubelet[1912]: W0517 00:51:51.221278 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.221355 kubelet[1912]: E0517 00:51:51.221290 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.221641 kubelet[1912]: E0517 00:51:51.221622 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.221641 kubelet[1912]: W0517 00:51:51.221638 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.221705 kubelet[1912]: E0517 00:51:51.221649 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.240726 kubelet[1912]: E0517 00:51:51.239767 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.240726 kubelet[1912]: W0517 00:51:51.239796 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.240726 kubelet[1912]: E0517 00:51:51.239815 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.240726 kubelet[1912]: E0517 00:51:51.240582 1912 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:51:51.240726 kubelet[1912]: W0517 00:51:51.240595 1912 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:51:51.240726 kubelet[1912]: E0517 00:51:51.240608 1912 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:51:51.330853 env[1446]: time="2025-05-17T00:51:51.330287494Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-x2hlm,Uid:4cc24172-5507-4fc1-8247-847bf32858ba,Namespace:calico-system,Attempt:0,}" May 17 00:51:51.334160 env[1446]: time="2025-05-17T00:51:51.334107611Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-xrm4g,Uid:f173c63b-fd11-4cf8-a8fe-caa75f3210f3,Namespace:kube-system,Attempt:0,}" May 17 00:51:51.979955 kubelet[1912]: E0517 00:51:51.979909 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:51:52.096418 update_engine[1440]: I0517 00:51:52.096372 1440 update_attempter.cc:509] Updating boot flags... May 17 00:51:52.980683 kubelet[1912]: E0517 00:51:52.980612 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:51:53.092471 kubelet[1912]: E0517 00:51:53.092032 1912 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-92l2r" podUID="1f904db8-53aa-4690-87de-f3596ea62196" May 17 00:51:53.980943 kubelet[1912]: E0517 00:51:53.980906 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:51:54.410403 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1810359202.mount: Deactivated successfully. May 17 00:51:54.439393 env[1446]: time="2025-05-17T00:51:54.439321041Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:51:54.465636 env[1446]: time="2025-05-17T00:51:54.465574263Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:51:54.468939 env[1446]: time="2025-05-17T00:51:54.468894621Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:51:54.479568 env[1446]: time="2025-05-17T00:51:54.479525414Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:51:54.484259 env[1446]: time="2025-05-17T00:51:54.484209410Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:51:54.503664 env[1446]: time="2025-05-17T00:51:54.503594757Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:51:54.551225 env[1446]: time="2025-05-17T00:51:54.551170485Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:51:54.611049 env[1446]: time="2025-05-17T00:51:54.610971085Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:51:54.981918 kubelet[1912]: E0517 00:51:54.981884 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:51:55.007891 env[1446]: time="2025-05-17T00:51:55.007804497Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:51:55.007891 env[1446]: time="2025-05-17T00:51:55.007849217Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:51:55.008107 env[1446]: time="2025-05-17T00:51:55.007859657Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:51:55.008172 env[1446]: time="2025-05-17T00:51:55.008103457Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3eefdfbaada5357169067ec0ebb658f1edc3940cd39f8484af673b1afc81cdf8 pid=2070 runtime=io.containerd.runc.v2 May 17 00:51:55.022141 systemd[1]: Started cri-containerd-3eefdfbaada5357169067ec0ebb658f1edc3940cd39f8484af673b1afc81cdf8.scope. May 17 00:51:55.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.043292 kernel: kauditd_printk_skb: 241 callbacks suppressed May 17 00:51:55.043361 kernel: audit: type=1400 audit(1747443115.036:438): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.076428 kernel: audit: type=1400 audit(1747443115.036:439): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.095035 kernel: audit: type=1400 audit(1747443115.036:440): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.096738 kubelet[1912]: E0517 00:51:55.096391 1912 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-92l2r" podUID="1f904db8-53aa-4690-87de-f3596ea62196" May 17 00:51:55.098136 kernel: audit: type=1400 audit(1747443115.036:441): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.136713 kernel: audit: type=1400 audit(1747443115.036:442): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.136904 kernel: audit: type=1400 audit(1747443115.036:443): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.173413 kernel: audit: type=1400 audit(1747443115.036:444): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.193629 kernel: audit: type=1400 audit(1747443115.036:445): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.195040 kernel: audit: type=1400 audit(1747443115.036:446): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.196123 env[1446]: time="2025-05-17T00:51:55.196063858Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-x2hlm,Uid:4cc24172-5507-4fc1-8247-847bf32858ba,Namespace:calico-system,Attempt:0,} returns sandbox id \"3eefdfbaada5357169067ec0ebb658f1edc3940cd39f8484af673b1afc81cdf8\"" May 17 00:51:55.202361 env[1446]: time="2025-05-17T00:51:55.202322574Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\"" May 17 00:51:55.214955 env[1446]: time="2025-05-17T00:51:55.214879566Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:51:55.215782 env[1446]: time="2025-05-17T00:51:55.215682646Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:51:55.215782 env[1446]: time="2025-05-17T00:51:55.215707886Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:51:55.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.233585 kernel: audit: type=1400 audit(1747443115.036:447): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.233777 env[1446]: time="2025-05-17T00:51:55.216394685Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e9174e8346de712a5a0cf79576f9a15f4a56efc27fecace973f435bf34a35b45 pid=2111 runtime=io.containerd.runc.v2 May 17 00:51:55.036000 audit: BPF prog-id=62 op=LOAD May 17 00:51:55.042000 audit[2079]: AVC avc: denied { bpf } for pid=2079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.042000 audit[2079]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2070 pid=2079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:55.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365656664666261616461353335373136393036376563306562623635 May 17 00:51:55.042000 audit[2079]: AVC avc: denied { perfmon } for pid=2079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.042000 audit[2079]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2070 pid=2079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:55.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365656664666261616461353335373136393036376563306562623635 May 17 00:51:55.042000 audit[2079]: AVC avc: denied { bpf } for pid=2079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.042000 audit[2079]: AVC avc: denied { bpf } for pid=2079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.042000 audit[2079]: AVC avc: denied { bpf } for pid=2079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.042000 audit[2079]: AVC avc: denied { perfmon } for pid=2079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.042000 audit[2079]: AVC avc: denied { perfmon } for pid=2079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.042000 audit[2079]: AVC avc: denied { perfmon } for pid=2079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.042000 audit[2079]: AVC avc: denied { perfmon } for pid=2079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.042000 audit[2079]: AVC avc: denied { perfmon } for pid=2079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.042000 audit[2079]: AVC avc: denied { bpf } for pid=2079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.042000 audit[2079]: AVC avc: denied { bpf } for pid=2079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.042000 audit: BPF prog-id=63 op=LOAD May 17 00:51:55.042000 audit[2079]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2070 pid=2079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:55.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365656664666261616461353335373136393036376563306562623635 May 17 00:51:55.058000 audit[2079]: AVC avc: denied { bpf } for pid=2079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.058000 audit[2079]: AVC avc: denied { bpf } for pid=2079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.058000 audit[2079]: AVC avc: denied { perfmon } for pid=2079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.058000 audit[2079]: AVC avc: denied { perfmon } for pid=2079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.058000 audit[2079]: AVC avc: denied { perfmon } for pid=2079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.058000 audit[2079]: AVC avc: denied { perfmon } for pid=2079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.058000 audit[2079]: AVC avc: denied { perfmon } for pid=2079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.058000 audit[2079]: AVC avc: denied { bpf } for pid=2079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.058000 audit[2079]: AVC avc: denied { bpf } for pid=2079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.058000 audit: BPF prog-id=64 op=LOAD May 17 00:51:55.058000 audit[2079]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2070 pid=2079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:55.058000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365656664666261616461353335373136393036376563306562623635 May 17 00:51:55.076000 audit: BPF prog-id=64 op=UNLOAD May 17 00:51:55.076000 audit: BPF prog-id=63 op=UNLOAD May 17 00:51:55.076000 audit[2079]: AVC avc: denied { bpf } for pid=2079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.076000 audit[2079]: AVC avc: denied { bpf } for pid=2079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.076000 audit[2079]: AVC avc: denied { bpf } for pid=2079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.076000 audit[2079]: AVC avc: denied { perfmon } for pid=2079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.076000 audit[2079]: AVC avc: denied { perfmon } for pid=2079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.076000 audit[2079]: AVC avc: denied { perfmon } for pid=2079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.076000 audit[2079]: AVC avc: denied { perfmon } for pid=2079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.076000 audit[2079]: AVC avc: denied { perfmon } for pid=2079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.076000 audit[2079]: AVC avc: denied { bpf } for pid=2079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.076000 audit[2079]: AVC avc: denied { bpf } for pid=2079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.076000 audit: BPF prog-id=65 op=LOAD May 17 00:51:55.076000 audit[2079]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2070 pid=2079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:55.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365656664666261616461353335373136393036376563306562623635 May 17 00:51:55.244389 systemd[1]: Started cri-containerd-e9174e8346de712a5a0cf79576f9a15f4a56efc27fecace973f435bf34a35b45.scope. May 17 00:51:55.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.257000 audit: BPF prog-id=66 op=LOAD May 17 00:51:55.258000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.258000 audit[2121]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2111 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:55.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539313734653833343664653731326135613063663739353736663961 May 17 00:51:55.258000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.258000 audit[2121]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2111 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:55.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539313734653833343664653731326135613063663739353736663961 May 17 00:51:55.259000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.259000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.259000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.259000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.259000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.259000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.259000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.259000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.259000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.259000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.259000 audit: BPF prog-id=67 op=LOAD May 17 00:51:55.259000 audit[2121]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2111 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:55.259000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539313734653833343664653731326135613063663739353736663961 May 17 00:51:55.259000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.259000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.259000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.259000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.259000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.259000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.259000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.259000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.259000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.259000 audit: BPF prog-id=68 op=LOAD May 17 00:51:55.259000 audit[2121]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2111 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:55.259000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539313734653833343664653731326135613063663739353736663961 May 17 00:51:55.260000 audit: BPF prog-id=68 op=UNLOAD May 17 00:51:55.260000 audit: BPF prog-id=67 op=UNLOAD May 17 00:51:55.260000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.260000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.260000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.260000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.260000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.260000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.260000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.260000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.260000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.260000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:55.260000 audit: BPF prog-id=69 op=LOAD May 17 00:51:55.260000 audit[2121]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2111 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:55.260000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539313734653833343664653731326135613063663739353736663961 May 17 00:51:55.278127 env[1446]: time="2025-05-17T00:51:55.278080246Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-xrm4g,Uid:f173c63b-fd11-4cf8-a8fe-caa75f3210f3,Namespace:kube-system,Attempt:0,} returns sandbox id \"e9174e8346de712a5a0cf79576f9a15f4a56efc27fecace973f435bf34a35b45\"" May 17 00:51:55.983241 kubelet[1912]: E0517 00:51:55.983176 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:51:56.682512 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1060810275.mount: Deactivated successfully. May 17 00:51:56.983996 kubelet[1912]: E0517 00:51:56.983951 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:51:57.091874 kubelet[1912]: E0517 00:51:57.091818 1912 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-92l2r" podUID="1f904db8-53aa-4690-87de-f3596ea62196" May 17 00:51:57.199067 env[1446]: time="2025-05-17T00:51:57.198994046Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:51:57.248534 env[1446]: time="2025-05-17T00:51:57.248169938Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:080eaf4c238c85534b61055c31b109c96ce3d20075391e58988541a442c7c701,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:51:57.290531 env[1446]: time="2025-05-17T00:51:57.290486515Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:51:57.354425 env[1446]: time="2025-05-17T00:51:57.354383039Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:ce76dd87f11d3fd0054c35ad2e0e9f833748d007f77a9bfe859d0ddcb66fcb2c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:51:57.355256 env[1446]: time="2025-05-17T00:51:57.355225559Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\" returns image reference \"sha256:080eaf4c238c85534b61055c31b109c96ce3d20075391e58988541a442c7c701\"" May 17 00:51:57.357312 env[1446]: time="2025-05-17T00:51:57.357211638Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.1\"" May 17 00:51:57.364883 env[1446]: time="2025-05-17T00:51:57.364841913Z" level=info msg="CreateContainer within sandbox \"3eefdfbaada5357169067ec0ebb658f1edc3940cd39f8484af673b1afc81cdf8\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 17 00:51:57.503341 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3424435233.mount: Deactivated successfully. May 17 00:51:57.748018 env[1446]: time="2025-05-17T00:51:57.747751660Z" level=info msg="CreateContainer within sandbox \"3eefdfbaada5357169067ec0ebb658f1edc3940cd39f8484af673b1afc81cdf8\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"8acef4b0310ad59508ba1b37dadd848fe9288a122087908f621c0991a64da8c2\"" May 17 00:51:57.749090 env[1446]: time="2025-05-17T00:51:57.749063060Z" level=info msg="StartContainer for \"8acef4b0310ad59508ba1b37dadd848fe9288a122087908f621c0991a64da8c2\"" May 17 00:51:57.811973 systemd[1]: Started cri-containerd-8acef4b0310ad59508ba1b37dadd848fe9288a122087908f621c0991a64da8c2.scope. May 17 00:51:57.815600 systemd[1]: run-containerd-runc-k8s.io-8acef4b0310ad59508ba1b37dadd848fe9288a122087908f621c0991a64da8c2-runc.iVlJIM.mount: Deactivated successfully. May 17 00:51:57.832000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:57.832000 audit[2154]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2070 pid=2154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:57.832000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861636566346230333130616435393530386261316233376461646438 May 17 00:51:57.832000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:57.832000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:57.832000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:57.832000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:57.832000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:57.832000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:57.832000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:57.832000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:57.832000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:57.832000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:57.832000 audit: BPF prog-id=70 op=LOAD May 17 00:51:57.832000 audit[2154]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2070 pid=2154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:57.832000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861636566346230333130616435393530386261316233376461646438 May 17 00:51:57.832000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:57.832000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:57.832000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:57.832000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:57.832000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:57.832000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:57.832000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:57.832000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:57.832000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:57.832000 audit: BPF prog-id=71 op=LOAD May 17 00:51:57.832000 audit[2154]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2070 pid=2154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:57.832000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861636566346230333130616435393530386261316233376461646438 May 17 00:51:57.832000 audit: BPF prog-id=71 op=UNLOAD May 17 00:51:57.832000 audit: BPF prog-id=70 op=UNLOAD May 17 00:51:57.832000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:57.832000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:57.832000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:57.832000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:57.832000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:57.832000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:57.832000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:57.832000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:57.832000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:57.832000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:51:57.832000 audit: BPF prog-id=72 op=LOAD May 17 00:51:57.832000 audit[2154]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2070 pid=2154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:51:57.832000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861636566346230333130616435393530386261316233376461646438 May 17 00:51:57.856262 systemd[1]: cri-containerd-8acef4b0310ad59508ba1b37dadd848fe9288a122087908f621c0991a64da8c2.scope: Deactivated successfully. May 17 00:51:57.859000 audit: BPF prog-id=72 op=UNLOAD May 17 00:51:57.895201 env[1446]: time="2025-05-17T00:51:57.895152098Z" level=info msg="StartContainer for \"8acef4b0310ad59508ba1b37dadd848fe9288a122087908f621c0991a64da8c2\" returns successfully" May 17 00:51:57.910701 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-8acef4b0310ad59508ba1b37dadd848fe9288a122087908f621c0991a64da8c2-rootfs.mount: Deactivated successfully. May 17 00:51:57.984939 kubelet[1912]: E0517 00:51:57.984900 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:51:58.985294 kubelet[1912]: E0517 00:51:58.985255 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:51:59.093787 kubelet[1912]: E0517 00:51:59.093740 1912 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-92l2r" podUID="1f904db8-53aa-4690-87de-f3596ea62196" May 17 00:51:59.986332 kubelet[1912]: E0517 00:51:59.986288 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:00.986833 kubelet[1912]: E0517 00:52:00.986787 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:01.092355 kubelet[1912]: E0517 00:52:01.092311 1912 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-92l2r" podUID="1f904db8-53aa-4690-87de-f3596ea62196" May 17 00:52:01.345162 env[1446]: time="2025-05-17T00:52:01.344642471Z" level=info msg="shim disconnected" id=8acef4b0310ad59508ba1b37dadd848fe9288a122087908f621c0991a64da8c2 May 17 00:52:01.345162 env[1446]: time="2025-05-17T00:52:01.344693316Z" level=warning msg="cleaning up after shim disconnected" id=8acef4b0310ad59508ba1b37dadd848fe9288a122087908f621c0991a64da8c2 namespace=k8s.io May 17 00:52:01.345162 env[1446]: time="2025-05-17T00:52:01.344706118Z" level=info msg="cleaning up dead shim" May 17 00:52:01.353775 env[1446]: time="2025-05-17T00:52:01.353733504Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:52:01Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2200 runtime=io.containerd.runc.v2\n" May 17 00:52:01.987521 kubelet[1912]: E0517 00:52:01.987472 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:02.987702 kubelet[1912]: E0517 00:52:02.987631 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:03.093243 kubelet[1912]: E0517 00:52:03.092206 1912 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-92l2r" podUID="1f904db8-53aa-4690-87de-f3596ea62196" May 17 00:52:03.331976 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1439366023.mount: Deactivated successfully. May 17 00:52:03.879580 env[1446]: time="2025-05-17T00:52:03.879533706Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:52:03.890389 env[1446]: time="2025-05-17T00:52:03.890327347Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3e58848989f556e36aa29d7852ab1712163960651e074d11cae9d31fb27192db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:52:03.894990 env[1446]: time="2025-05-17T00:52:03.894949724Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:52:03.900256 env[1446]: time="2025-05-17T00:52:03.900218530Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:7ddf379897139ae8ade8b33cb9373b70c632a4d5491da6e234f5d830e0a50807,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:52:03.900588 env[1446]: time="2025-05-17T00:52:03.900553046Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.1\" returns image reference \"sha256:3e58848989f556e36aa29d7852ab1712163960651e074d11cae9d31fb27192db\"" May 17 00:52:03.902919 env[1446]: time="2025-05-17T00:52:03.902881816Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\"" May 17 00:52:03.908218 env[1446]: time="2025-05-17T00:52:03.908058253Z" level=info msg="CreateContainer within sandbox \"e9174e8346de712a5a0cf79576f9a15f4a56efc27fecace973f435bf34a35b45\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 17 00:52:03.937578 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1887166266.mount: Deactivated successfully. May 17 00:52:03.956569 env[1446]: time="2025-05-17T00:52:03.956513823Z" level=info msg="CreateContainer within sandbox \"e9174e8346de712a5a0cf79576f9a15f4a56efc27fecace973f435bf34a35b45\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"86b9ab832e6c86891a42351140638a1d3d61cf7c8c5a5c9c40ef7746a6c1dfa3\"" May 17 00:52:03.957105 env[1446]: time="2025-05-17T00:52:03.957077844Z" level=info msg="StartContainer for \"86b9ab832e6c86891a42351140638a1d3d61cf7c8c5a5c9c40ef7746a6c1dfa3\"" May 17 00:52:03.965740 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1805341522.mount: Deactivated successfully. May 17 00:52:03.986586 systemd[1]: run-containerd-runc-k8s.io-86b9ab832e6c86891a42351140638a1d3d61cf7c8c5a5c9c40ef7746a6c1dfa3-runc.DW2Lxz.mount: Deactivated successfully. May 17 00:52:03.989294 kubelet[1912]: E0517 00:52:03.988766 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:03.991337 systemd[1]: Started cri-containerd-86b9ab832e6c86891a42351140638a1d3d61cf7c8c5a5c9c40ef7746a6c1dfa3.scope. May 17 00:52:04.004000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:04.010947 kernel: kauditd_printk_skb: 148 callbacks suppressed May 17 00:52:04.011089 kernel: audit: type=1400 audit(1747443124.004:481): avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:04.004000 audit[2220]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2111 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:04.055913 kernel: audit: type=1300 audit(1747443124.004:481): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2111 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:04.004000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836623961623833326536633836383931613432333531313430363338 May 17 00:52:04.092065 kernel: audit: type=1327 audit(1747443124.004:481): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836623961623833326536633836383931613432333531313430363338 May 17 00:52:04.004000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:04.112445 kernel: audit: type=1400 audit(1747443124.004:482): avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:04.004000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:04.131257 kernel: audit: type=1400 audit(1747443124.004:482): avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:04.004000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:04.150578 kernel: audit: type=1400 audit(1747443124.004:482): avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:04.004000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:04.171447 kernel: audit: type=1400 audit(1747443124.004:482): avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:04.172205 env[1446]: time="2025-05-17T00:52:04.172168984Z" level=info msg="StartContainer for \"86b9ab832e6c86891a42351140638a1d3d61cf7c8c5a5c9c40ef7746a6c1dfa3\" returns successfully" May 17 00:52:04.004000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:04.193676 kernel: audit: type=1400 audit(1747443124.004:482): avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:04.004000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:04.215044 kernel: audit: type=1400 audit(1747443124.004:482): avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:04.004000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:04.233408 kernel: audit: type=1400 audit(1747443124.004:482): avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:04.004000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:04.004000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:04.004000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:04.004000 audit: BPF prog-id=73 op=LOAD May 17 00:52:04.004000 audit[2220]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2111 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:04.004000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836623961623833326536633836383931613432333531313430363338 May 17 00:52:04.004000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:04.004000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:04.004000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:04.004000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:04.004000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:04.004000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:04.004000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:04.004000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:04.004000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:04.004000 audit: BPF prog-id=74 op=LOAD May 17 00:52:04.004000 audit[2220]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2111 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:04.004000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836623961623833326536633836383931613432333531313430363338 May 17 00:52:04.004000 audit: BPF prog-id=74 op=UNLOAD May 17 00:52:04.004000 audit: BPF prog-id=73 op=UNLOAD May 17 00:52:04.004000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:04.004000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:04.004000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:04.004000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:04.004000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:04.004000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:04.004000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:04.004000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:04.004000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:04.004000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:04.004000 audit: BPF prog-id=75 op=LOAD May 17 00:52:04.004000 audit[2220]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2111 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:04.004000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836623961623833326536633836383931613432333531313430363338 May 17 00:52:04.332000 audit[2281]: NETFILTER_CFG table=mangle:19 family=2 entries=1 op=nft_register_chain pid=2281 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:52:04.332000 audit[2281]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd6bd6180 a2=0 a3=1 items=0 ppid=2230 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:04.332000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:52:04.333000 audit[2282]: NETFILTER_CFG table=mangle:20 family=10 entries=1 op=nft_register_chain pid=2282 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:52:04.333000 audit[2282]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff1c4f910 a2=0 a3=1 items=0 ppid=2230 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:04.333000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:52:04.334000 audit[2286]: NETFILTER_CFG table=nat:21 family=10 entries=1 op=nft_register_chain pid=2286 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:52:04.334000 audit[2286]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff5835750 a2=0 a3=1 items=0 ppid=2230 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:04.334000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:52:04.335000 audit[2284]: NETFILTER_CFG table=nat:22 family=2 entries=1 op=nft_register_chain pid=2284 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:52:04.335000 audit[2284]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe20bcab0 a2=0 a3=1 items=0 ppid=2230 pid=2284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:04.335000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:52:04.338000 audit[2288]: NETFILTER_CFG table=filter:23 family=10 entries=1 op=nft_register_chain pid=2288 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:52:04.338000 audit[2288]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe5dd65f0 a2=0 a3=1 items=0 ppid=2230 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:04.338000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 00:52:04.339000 audit[2289]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_chain pid=2289 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:52:04.339000 audit[2289]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff42f1cb0 a2=0 a3=1 items=0 ppid=2230 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:04.339000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 00:52:04.436000 audit[2290]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=2290 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:52:04.436000 audit[2290]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffff45aced0 a2=0 a3=1 items=0 ppid=2230 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:04.436000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 00:52:04.440000 audit[2292]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=2292 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:52:04.440000 audit[2292]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffc8be0440 a2=0 a3=1 items=0 ppid=2230 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:04.440000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 17 00:52:04.443000 audit[2295]: NETFILTER_CFG table=filter:27 family=2 entries=2 op=nft_register_chain pid=2295 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:52:04.443000 audit[2295]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffff47d6820 a2=0 a3=1 items=0 ppid=2230 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:04.443000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 17 00:52:04.444000 audit[2296]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2296 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:52:04.444000 audit[2296]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc4c4ecd0 a2=0 a3=1 items=0 ppid=2230 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:04.444000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 00:52:04.446000 audit[2298]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2298 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:52:04.446000 audit[2298]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd37202d0 a2=0 a3=1 items=0 ppid=2230 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:04.446000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 00:52:04.448000 audit[2299]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2299 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:52:04.448000 audit[2299]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffa9e2260 a2=0 a3=1 items=0 ppid=2230 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:04.448000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 00:52:04.450000 audit[2301]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=2301 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:52:04.450000 audit[2301]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffecb6ed80 a2=0 a3=1 items=0 ppid=2230 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:04.450000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 00:52:04.453000 audit[2304]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2304 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:52:04.453000 audit[2304]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffc425c3e0 a2=0 a3=1 items=0 ppid=2230 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:04.453000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 17 00:52:04.454000 audit[2305]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_chain pid=2305 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:52:04.454000 audit[2305]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff689c6b0 a2=0 a3=1 items=0 ppid=2230 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:04.454000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 00:52:04.456000 audit[2307]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_rule pid=2307 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:52:04.456000 audit[2307]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffde488ca0 a2=0 a3=1 items=0 ppid=2230 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:04.456000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 00:52:04.458000 audit[2308]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=2308 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:52:04.458000 audit[2308]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcc20c5d0 a2=0 a3=1 items=0 ppid=2230 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:04.458000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 00:52:04.460000 audit[2310]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_rule pid=2310 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:52:04.460000 audit[2310]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdf77a300 a2=0 a3=1 items=0 ppid=2230 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:04.460000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:52:04.470000 audit[2313]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_rule pid=2313 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:52:04.470000 audit[2313]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffd260f20 a2=0 a3=1 items=0 ppid=2230 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:04.470000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:52:04.474000 audit[2316]: NETFILTER_CFG table=filter:38 family=2 entries=1 op=nft_register_rule pid=2316 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:52:04.474000 audit[2316]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc4df7170 a2=0 a3=1 items=0 ppid=2230 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:04.474000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 00:52:04.475000 audit[2317]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2317 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:52:04.475000 audit[2317]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffcee820f0 a2=0 a3=1 items=0 ppid=2230 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:04.475000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 00:52:04.478000 audit[2319]: NETFILTER_CFG table=nat:40 family=2 entries=2 op=nft_register_chain pid=2319 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:52:04.478000 audit[2319]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffd1d6c0b0 a2=0 a3=1 items=0 ppid=2230 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:04.478000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:52:04.537000 audit[2323]: NETFILTER_CFG table=nat:41 family=2 entries=2 op=nft_register_chain pid=2323 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:52:04.537000 audit[2323]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffde4f6580 a2=0 a3=1 items=0 ppid=2230 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:04.537000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:52:04.538000 audit[2324]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_chain pid=2324 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:52:04.538000 audit[2324]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff23bbaf0 a2=0 a3=1 items=0 ppid=2230 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:04.538000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 00:52:04.544000 audit[2326]: NETFILTER_CFG table=nat:43 family=2 entries=2 op=nft_register_chain pid=2326 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:52:04.544000 audit[2326]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffcd1a8a30 a2=0 a3=1 items=0 ppid=2230 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:04.544000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 00:52:04.623000 audit[2332]: NETFILTER_CFG table=filter:44 family=2 entries=7 op=nft_register_rule pid=2332 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:52:04.623000 audit[2332]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffe105dbd0 a2=0 a3=1 items=0 ppid=2230 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:04.623000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:52:04.715000 audit[2332]: NETFILTER_CFG table=nat:45 family=2 entries=65 op=nft_register_chain pid=2332 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:52:04.715000 audit[2332]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=30940 a0=3 a1=ffffe105dbd0 a2=0 a3=1 items=0 ppid=2230 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:04.715000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:52:04.744000 audit[2341]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2341 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:52:04.744000 audit[2341]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffdf6455e0 a2=0 a3=1 items=0 ppid=2230 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:04.744000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 00:52:04.747000 audit[2343]: NETFILTER_CFG table=filter:47 family=10 entries=2 op=nft_register_chain pid=2343 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:52:04.747000 audit[2343]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffc12cad00 a2=0 a3=1 items=0 ppid=2230 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:04.747000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 17 00:52:04.751000 audit[2346]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=2346 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:52:04.751000 audit[2346]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffff30c2fa0 a2=0 a3=1 items=0 ppid=2230 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:04.751000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 17 00:52:04.753000 audit[2347]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2347 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:52:04.753000 audit[2347]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe8e94d60 a2=0 a3=1 items=0 ppid=2230 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:04.753000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 00:52:04.755000 audit[2349]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2349 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:52:04.755000 audit[2349]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffcaa78ba0 a2=0 a3=1 items=0 ppid=2230 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:04.755000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 00:52:04.756000 audit[2350]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=2350 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:52:04.756000 audit[2350]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffeedd200 a2=0 a3=1 items=0 ppid=2230 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:04.756000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 00:52:04.759000 audit[2352]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=2352 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:52:04.759000 audit[2352]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffc2cd3d60 a2=0 a3=1 items=0 ppid=2230 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:04.759000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 17 00:52:04.762000 audit[2355]: NETFILTER_CFG table=filter:53 family=10 entries=2 op=nft_register_chain pid=2355 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:52:04.762000 audit[2355]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffe6d23600 a2=0 a3=1 items=0 ppid=2230 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:04.762000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 00:52:04.764000 audit[2356]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_chain pid=2356 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:52:04.764000 audit[2356]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffebaac3d0 a2=0 a3=1 items=0 ppid=2230 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:04.764000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 00:52:04.766000 audit[2358]: NETFILTER_CFG table=filter:55 family=10 entries=1 op=nft_register_rule pid=2358 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:52:04.766000 audit[2358]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe90806c0 a2=0 a3=1 items=0 ppid=2230 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:04.766000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 00:52:04.767000 audit[2359]: NETFILTER_CFG table=filter:56 family=10 entries=1 op=nft_register_chain pid=2359 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:52:04.767000 audit[2359]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffbf6be90 a2=0 a3=1 items=0 ppid=2230 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:04.767000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 00:52:04.769000 audit[2361]: NETFILTER_CFG table=filter:57 family=10 entries=1 op=nft_register_rule pid=2361 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:52:04.769000 audit[2361]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffcd429990 a2=0 a3=1 items=0 ppid=2230 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:04.769000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:52:04.773000 audit[2364]: NETFILTER_CFG table=filter:58 family=10 entries=1 op=nft_register_rule pid=2364 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:52:04.773000 audit[2364]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff08e84e0 a2=0 a3=1 items=0 ppid=2230 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:04.773000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 00:52:04.776000 audit[2367]: NETFILTER_CFG table=filter:59 family=10 entries=1 op=nft_register_rule pid=2367 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:52:04.776000 audit[2367]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffda1a8600 a2=0 a3=1 items=0 ppid=2230 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:04.776000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 17 00:52:04.777000 audit[2368]: NETFILTER_CFG table=nat:60 family=10 entries=1 op=nft_register_chain pid=2368 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:52:04.777000 audit[2368]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffcf5fe890 a2=0 a3=1 items=0 ppid=2230 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:04.777000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 00:52:04.780000 audit[2370]: NETFILTER_CFG table=nat:61 family=10 entries=2 op=nft_register_chain pid=2370 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:52:04.780000 audit[2370]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffc31c97b0 a2=0 a3=1 items=0 ppid=2230 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:04.780000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:52:04.783000 audit[2373]: NETFILTER_CFG table=nat:62 family=10 entries=2 op=nft_register_chain pid=2373 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:52:04.783000 audit[2373]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=fffffaeef750 a2=0 a3=1 items=0 ppid=2230 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:04.783000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:52:04.784000 audit[2374]: NETFILTER_CFG table=nat:63 family=10 entries=1 op=nft_register_chain pid=2374 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:52:04.784000 audit[2374]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffff54a450 a2=0 a3=1 items=0 ppid=2230 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:04.784000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 00:52:04.788000 audit[2376]: NETFILTER_CFG table=nat:64 family=10 entries=2 op=nft_register_chain pid=2376 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:52:04.788000 audit[2376]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=fffffa8b97e0 a2=0 a3=1 items=0 ppid=2230 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:04.788000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 00:52:04.789000 audit[2377]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2377 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:52:04.789000 audit[2377]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe96c5460 a2=0 a3=1 items=0 ppid=2230 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:04.789000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 00:52:04.792000 audit[2379]: NETFILTER_CFG table=filter:66 family=10 entries=1 op=nft_register_rule pid=2379 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:52:04.792000 audit[2379]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffccc35b80 a2=0 a3=1 items=0 ppid=2230 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:04.792000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:52:04.795000 audit[2382]: NETFILTER_CFG table=filter:67 family=10 entries=1 op=nft_register_rule pid=2382 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:52:04.795000 audit[2382]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd511b570 a2=0 a3=1 items=0 ppid=2230 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:04.795000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:52:04.798000 audit[2384]: NETFILTER_CFG table=filter:68 family=10 entries=3 op=nft_register_rule pid=2384 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 00:52:04.798000 audit[2384]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2088 a0=3 a1=ffffe41428e0 a2=0 a3=1 items=0 ppid=2230 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:04.798000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:52:04.799000 audit[2384]: NETFILTER_CFG table=nat:69 family=10 entries=7 op=nft_register_chain pid=2384 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 00:52:04.799000 audit[2384]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffe41428e0 a2=0 a3=1 items=0 ppid=2230 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:04.799000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:52:04.990629 kubelet[1912]: E0517 00:52:04.990419 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:05.092893 kubelet[1912]: E0517 00:52:05.091468 1912 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-92l2r" podUID="1f904db8-53aa-4690-87de-f3596ea62196" May 17 00:52:05.990539 kubelet[1912]: E0517 00:52:05.990499 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:06.990919 kubelet[1912]: E0517 00:52:06.990881 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:07.091939 kubelet[1912]: E0517 00:52:07.091883 1912 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-92l2r" podUID="1f904db8-53aa-4690-87de-f3596ea62196" May 17 00:52:07.992612 kubelet[1912]: E0517 00:52:07.992560 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:08.491751 env[1446]: time="2025-05-17T00:52:08.491692850Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:52:08.499132 env[1446]: time="2025-05-17T00:52:08.499085423Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0a1b3d5412de2974bc057a3463a132f935c307bc06d5b990ad54031e1f5a351d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:52:08.508416 env[1446]: time="2025-05-17T00:52:08.508366892Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:52:08.513022 env[1446]: time="2025-05-17T00:52:08.512968643Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:3dd06656abdc03fbd51782d5f6fe4d70e6825a1c0c5bce2a165bbd2ff9e0f7df,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:52:08.513645 env[1446]: time="2025-05-17T00:52:08.513613623Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\" returns image reference \"sha256:0a1b3d5412de2974bc057a3463a132f935c307bc06d5b990ad54031e1f5a351d\"" May 17 00:52:08.524594 env[1446]: time="2025-05-17T00:52:08.524543287Z" level=info msg="CreateContainer within sandbox \"3eefdfbaada5357169067ec0ebb658f1edc3940cd39f8484af673b1afc81cdf8\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 17 00:52:08.559852 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2780536785.mount: Deactivated successfully. May 17 00:52:08.591768 env[1446]: time="2025-05-17T00:52:08.591718697Z" level=info msg="CreateContainer within sandbox \"3eefdfbaada5357169067ec0ebb658f1edc3940cd39f8484af673b1afc81cdf8\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"23dbb74acacbc20e244ac4eeae927a526fb4ece7e66f652c3a0f24abf5b0ba8e\"" May 17 00:52:08.592844 env[1446]: time="2025-05-17T00:52:08.592801599Z" level=info msg="StartContainer for \"23dbb74acacbc20e244ac4eeae927a526fb4ece7e66f652c3a0f24abf5b0ba8e\"" May 17 00:52:08.617112 systemd[1]: run-containerd-runc-k8s.io-23dbb74acacbc20e244ac4eeae927a526fb4ece7e66f652c3a0f24abf5b0ba8e-runc.WG2Dew.mount: Deactivated successfully. May 17 00:52:08.618500 systemd[1]: Started cri-containerd-23dbb74acacbc20e244ac4eeae927a526fb4ece7e66f652c3a0f24abf5b0ba8e.scope. May 17 00:52:08.631000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:08.631000 audit[2393]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2070 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:08.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233646262373461636163626332306532343461633465656165393237 May 17 00:52:08.631000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:08.631000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:08.631000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:08.631000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:08.631000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:08.631000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:08.631000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:08.631000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:08.631000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:08.631000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:08.631000 audit: BPF prog-id=76 op=LOAD May 17 00:52:08.631000 audit[2393]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2070 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:08.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233646262373461636163626332306532343461633465656165393237 May 17 00:52:08.631000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:08.631000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:08.631000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:08.631000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:08.631000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:08.631000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:08.631000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:08.631000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:08.631000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:08.631000 audit: BPF prog-id=77 op=LOAD May 17 00:52:08.631000 audit[2393]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2070 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:08.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233646262373461636163626332306532343461633465656165393237 May 17 00:52:08.631000 audit: BPF prog-id=77 op=UNLOAD May 17 00:52:08.631000 audit: BPF prog-id=76 op=UNLOAD May 17 00:52:08.631000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:08.631000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:08.631000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:08.631000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:08.631000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:08.631000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:08.631000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:08.631000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:08.631000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:08.631000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:08.631000 audit: BPF prog-id=78 op=LOAD May 17 00:52:08.631000 audit[2393]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2070 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:08.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233646262373461636163626332306532343461633465656165393237 May 17 00:52:08.648383 env[1446]: time="2025-05-17T00:52:08.648319958Z" level=info msg="StartContainer for \"23dbb74acacbc20e244ac4eeae927a526fb4ece7e66f652c3a0f24abf5b0ba8e\" returns successfully" May 17 00:52:08.975976 kubelet[1912]: E0517 00:52:08.975947 1912 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:08.993494 kubelet[1912]: E0517 00:52:08.993470 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:09.091573 kubelet[1912]: E0517 00:52:09.091530 1912 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-92l2r" podUID="1f904db8-53aa-4690-87de-f3596ea62196" May 17 00:52:09.243462 kubelet[1912]: I0517 00:52:09.243306 1912 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-xrm4g" podStartSLOduration=11.620631465 podStartE2EDuration="20.243288384s" podCreationTimestamp="2025-05-17 00:51:49 +0000 UTC" firstStartedPulling="2025-05-17 00:51:55.279367005 +0000 UTC m=+7.958219401" lastFinishedPulling="2025-05-17 00:52:03.902023924 +0000 UTC m=+16.580876320" observedRunningTime="2025-05-17 00:52:05.236547776 +0000 UTC m=+17.915400212" watchObservedRunningTime="2025-05-17 00:52:09.243288384 +0000 UTC m=+21.922140820" May 17 00:52:09.880184 env[1446]: time="2025-05-17T00:52:09.880114335Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 17 00:52:09.882369 systemd[1]: cri-containerd-23dbb74acacbc20e244ac4eeae927a526fb4ece7e66f652c3a0f24abf5b0ba8e.scope: Deactivated successfully. May 17 00:52:09.893030 kernel: kauditd_printk_skb: 229 callbacks suppressed May 17 00:52:09.893167 kernel: audit: type=1334 audit(1747443129.885:544): prog-id=78 op=UNLOAD May 17 00:52:09.885000 audit: BPF prog-id=78 op=UNLOAD May 17 00:52:09.893533 kubelet[1912]: I0517 00:52:09.893506 1912 kubelet_node_status.go:501] "Fast updating node status as it just became ready" May 17 00:52:09.913170 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-23dbb74acacbc20e244ac4eeae927a526fb4ece7e66f652c3a0f24abf5b0ba8e-rootfs.mount: Deactivated successfully. May 17 00:52:09.994778 kubelet[1912]: E0517 00:52:09.994725 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:10.995103 kubelet[1912]: E0517 00:52:10.995049 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:11.098373 systemd[1]: Created slice kubepods-besteffort-pod1f904db8_53aa_4690_87de_f3596ea62196.slice. May 17 00:52:11.101066 env[1446]: time="2025-05-17T00:52:11.100994708Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-92l2r,Uid:1f904db8-53aa-4690-87de-f3596ea62196,Namespace:calico-system,Attempt:0,}" May 17 00:52:11.996030 kubelet[1912]: E0517 00:52:11.995986 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:12.996510 kubelet[1912]: E0517 00:52:12.996467 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:13.997586 kubelet[1912]: E0517 00:52:13.997543 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:14.997934 kubelet[1912]: E0517 00:52:14.997880 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:16.350976 kubelet[1912]: E0517 00:52:15.998167 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:16.402037 env[1446]: time="2025-05-17T00:52:16.401707202Z" level=info msg="shim disconnected" id=23dbb74acacbc20e244ac4eeae927a526fb4ece7e66f652c3a0f24abf5b0ba8e May 17 00:52:16.402037 env[1446]: time="2025-05-17T00:52:16.401768327Z" level=warning msg="cleaning up after shim disconnected" id=23dbb74acacbc20e244ac4eeae927a526fb4ece7e66f652c3a0f24abf5b0ba8e namespace=k8s.io May 17 00:52:16.402037 env[1446]: time="2025-05-17T00:52:16.401779568Z" level=info msg="cleaning up dead shim" May 17 00:52:16.401882 systemd[1]: Created slice kubepods-besteffort-pod31021edc_d961_4749_968e_cec33d34c54e.slice. May 17 00:52:16.411287 env[1446]: time="2025-05-17T00:52:16.411200120Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:52:16Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2433 runtime=io.containerd.runc.v2\n" May 17 00:52:16.478027 env[1446]: time="2025-05-17T00:52:16.477935082Z" level=error msg="Failed to destroy network for sandbox \"8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:52:16.479632 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0-shm.mount: Deactivated successfully. May 17 00:52:16.480816 env[1446]: time="2025-05-17T00:52:16.480759455Z" level=error msg="encountered an error cleaning up failed sandbox \"8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:52:16.480883 env[1446]: time="2025-05-17T00:52:16.480836821Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-92l2r,Uid:1f904db8-53aa-4690-87de-f3596ea62196,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:52:16.481590 kubelet[1912]: E0517 00:52:16.481092 1912 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:52:16.481590 kubelet[1912]: E0517 00:52:16.481192 1912 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-92l2r" May 17 00:52:16.481590 kubelet[1912]: E0517 00:52:16.481215 1912 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-92l2r" May 17 00:52:16.481770 kubelet[1912]: E0517 00:52:16.481298 1912 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-92l2r_calico-system(1f904db8-53aa-4690-87de-f3596ea62196)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-92l2r_calico-system(1f904db8-53aa-4690-87de-f3596ea62196)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-92l2r" podUID="1f904db8-53aa-4690-87de-f3596ea62196" May 17 00:52:16.567385 kubelet[1912]: I0517 00:52:16.567285 1912 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-trms8\" (UniqueName: \"kubernetes.io/projected/31021edc-d961-4749-968e-cec33d34c54e-kube-api-access-trms8\") pod \"nginx-deployment-7fcdb87857-7fdlz\" (UID: \"31021edc-d961-4749-968e-cec33d34c54e\") " pod="default/nginx-deployment-7fcdb87857-7fdlz" May 17 00:52:16.706857 env[1446]: time="2025-05-17T00:52:16.706130844Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-7fdlz,Uid:31021edc-d961-4749-968e-cec33d34c54e,Namespace:default,Attempt:0,}" May 17 00:52:16.788782 env[1446]: time="2025-05-17T00:52:16.788726685Z" level=error msg="Failed to destroy network for sandbox \"1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:52:16.789297 env[1446]: time="2025-05-17T00:52:16.789263925Z" level=error msg="encountered an error cleaning up failed sandbox \"1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:52:16.789427 env[1446]: time="2025-05-17T00:52:16.789397936Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-7fdlz,Uid:31021edc-d961-4749-968e-cec33d34c54e,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:52:16.790207 kubelet[1912]: E0517 00:52:16.789727 1912 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:52:16.790207 kubelet[1912]: E0517 00:52:16.789799 1912 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-7fdlz" May 17 00:52:16.790207 kubelet[1912]: E0517 00:52:16.789822 1912 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-7fdlz" May 17 00:52:16.790393 kubelet[1912]: E0517 00:52:16.789888 1912 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-7fcdb87857-7fdlz_default(31021edc-d961-4749-968e-cec33d34c54e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-7fcdb87857-7fdlz_default(31021edc-d961-4749-968e-cec33d34c54e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-7fdlz" podUID="31021edc-d961-4749-968e-cec33d34c54e" May 17 00:52:16.999240 kubelet[1912]: E0517 00:52:16.999196 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:17.241482 env[1446]: time="2025-05-17T00:52:17.241445181Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\"" May 17 00:52:17.242419 kubelet[1912]: I0517 00:52:17.242384 1912 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0" May 17 00:52:17.244242 env[1446]: time="2025-05-17T00:52:17.244206264Z" level=info msg="StopPodSandbox for \"8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0\"" May 17 00:52:17.245481 kubelet[1912]: I0517 00:52:17.245455 1912 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b" May 17 00:52:17.246132 env[1446]: time="2025-05-17T00:52:17.246102804Z" level=info msg="StopPodSandbox for \"1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b\"" May 17 00:52:17.276780 env[1446]: time="2025-05-17T00:52:17.276306747Z" level=error msg="StopPodSandbox for \"8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0\" failed" error="failed to destroy network for sandbox \"8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:52:17.277148 env[1446]: time="2025-05-17T00:52:17.277034561Z" level=error msg="StopPodSandbox for \"1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b\" failed" error="failed to destroy network for sandbox \"1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:52:17.277632 kubelet[1912]: E0517 00:52:17.277585 1912 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0" May 17 00:52:17.277708 kubelet[1912]: E0517 00:52:17.277650 1912 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0"} May 17 00:52:17.277737 kubelet[1912]: E0517 00:52:17.277705 1912 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1f904db8-53aa-4690-87de-f3596ea62196\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:52:17.277737 kubelet[1912]: E0517 00:52:17.277726 1912 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1f904db8-53aa-4690-87de-f3596ea62196\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-92l2r" podUID="1f904db8-53aa-4690-87de-f3596ea62196" May 17 00:52:17.277850 kubelet[1912]: E0517 00:52:17.277793 1912 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b" May 17 00:52:17.277850 kubelet[1912]: E0517 00:52:17.277812 1912 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b"} May 17 00:52:17.277850 kubelet[1912]: E0517 00:52:17.277831 1912 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"31021edc-d961-4749-968e-cec33d34c54e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:52:17.277850 kubelet[1912]: E0517 00:52:17.277846 1912 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"31021edc-d961-4749-968e-cec33d34c54e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-7fdlz" podUID="31021edc-d961-4749-968e-cec33d34c54e" May 17 00:52:17.421869 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b-shm.mount: Deactivated successfully. May 17 00:52:18.000304 kubelet[1912]: E0517 00:52:18.000262 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:19.001297 kubelet[1912]: E0517 00:52:19.001252 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:20.002014 kubelet[1912]: E0517 00:52:20.001963 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:21.003121 kubelet[1912]: E0517 00:52:21.003066 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:22.004130 kubelet[1912]: E0517 00:52:22.004092 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:23.004616 kubelet[1912]: E0517 00:52:23.004569 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:24.195066 kubelet[1912]: E0517 00:52:24.004815 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:25.005481 kubelet[1912]: E0517 00:52:25.005417 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:26.005895 kubelet[1912]: E0517 00:52:26.005837 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:27.006191 kubelet[1912]: E0517 00:52:27.006126 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:27.071710 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount261781068.mount: Deactivated successfully. May 17 00:52:27.285414 env[1446]: time="2025-05-17T00:52:27.285053207Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:52:27.292970 env[1446]: time="2025-05-17T00:52:27.292910776Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f7148fde8e28b27da58f84cac134cdc53b5df321cda13c660192f06839670732,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:52:27.298330 env[1446]: time="2025-05-17T00:52:27.298293843Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:52:27.306033 env[1446]: time="2025-05-17T00:52:27.305985002Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:7cb61ea47ca0a8e6d0526a42da4f1e399b37ccd13339d0776d272465cb7ee012,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:52:27.306347 env[1446]: time="2025-05-17T00:52:27.306316941Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\" returns image reference \"sha256:f7148fde8e28b27da58f84cac134cdc53b5df321cda13c660192f06839670732\"" May 17 00:52:27.331239 env[1446]: time="2025-05-17T00:52:27.331192562Z" level=info msg="CreateContainer within sandbox \"3eefdfbaada5357169067ec0ebb658f1edc3940cd39f8484af673b1afc81cdf8\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 17 00:52:27.370770 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount690181173.mount: Deactivated successfully. May 17 00:52:27.392863 env[1446]: time="2025-05-17T00:52:27.392812002Z" level=info msg="CreateContainer within sandbox \"3eefdfbaada5357169067ec0ebb658f1edc3940cd39f8484af673b1afc81cdf8\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"7b4233ed62f268ef89ea5a06e88433db7100c8a19c0f9bd16738ae6ea0b34595\"" May 17 00:52:27.393647 env[1446]: time="2025-05-17T00:52:27.393620488Z" level=info msg="StartContainer for \"7b4233ed62f268ef89ea5a06e88433db7100c8a19c0f9bd16738ae6ea0b34595\"" May 17 00:52:27.411420 systemd[1]: Started cri-containerd-7b4233ed62f268ef89ea5a06e88433db7100c8a19c0f9bd16738ae6ea0b34595.scope. May 17 00:52:27.428000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:27.428000 audit[2542]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2070 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:27.475231 kernel: audit: type=1400 audit(1747443147.428:545): avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:27.475378 kernel: audit: type=1300 audit(1747443147.428:545): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2070 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:27.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762343233336564363266323638656638396561356130366538383433 May 17 00:52:27.501407 kernel: audit: type=1327 audit(1747443147.428:545): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762343233336564363266323638656638396561356130366538383433 May 17 00:52:27.428000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:27.520292 kernel: audit: type=1400 audit(1747443147.428:546): avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:27.428000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:27.538076 kernel: audit: type=1400 audit(1747443147.428:546): avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:27.538304 kernel: audit: type=1400 audit(1747443147.428:546): avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:27.428000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:27.428000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:27.579582 kernel: audit: type=1400 audit(1747443147.428:546): avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:27.598370 kernel: audit: type=1400 audit(1747443147.428:546): avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:27.428000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:27.428000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:27.616634 kernel: audit: type=1400 audit(1747443147.428:546): avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:27.616859 env[1446]: time="2025-05-17T00:52:27.616808316Z" level=info msg="StartContainer for \"7b4233ed62f268ef89ea5a06e88433db7100c8a19c0f9bd16738ae6ea0b34595\" returns successfully" May 17 00:52:27.428000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:27.635339 kernel: audit: type=1400 audit(1747443147.428:546): avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:27.428000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:27.428000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:27.428000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:27.428000 audit: BPF prog-id=79 op=LOAD May 17 00:52:27.428000 audit[2542]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2070 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:27.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762343233336564363266323638656638396561356130366538383433 May 17 00:52:27.446000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:27.446000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:27.446000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:27.446000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:27.446000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:27.446000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:27.446000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:27.446000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:27.446000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:27.446000 audit: BPF prog-id=80 op=LOAD May 17 00:52:27.446000 audit[2542]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2070 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:27.446000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762343233336564363266323638656638396561356130366538383433 May 17 00:52:27.446000 audit: BPF prog-id=80 op=UNLOAD May 17 00:52:27.446000 audit: BPF prog-id=79 op=UNLOAD May 17 00:52:27.446000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:27.446000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:27.446000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:27.446000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:27.446000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:27.446000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:27.446000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:27.446000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:27.446000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:27.446000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:27.446000 audit: BPF prog-id=81 op=LOAD May 17 00:52:27.446000 audit[2542]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2070 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:27.446000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762343233336564363266323638656638396561356130366538383433 May 17 00:52:27.901705 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 17 00:52:27.901840 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 17 00:52:28.007321 kubelet[1912]: E0517 00:52:28.007262 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:28.091942 env[1446]: time="2025-05-17T00:52:28.091789161Z" level=info msg="StopPodSandbox for \"8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0\"" May 17 00:52:28.190315 env[1446]: 2025-05-17 00:52:28.152 [INFO][2594] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0" May 17 00:52:28.190315 env[1446]: 2025-05-17 00:52:28.152 [INFO][2594] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0" iface="eth0" netns="/var/run/netns/cni-0c665028-2d21-744e-27d5-11a925e5c820" May 17 00:52:28.190315 env[1446]: 2025-05-17 00:52:28.152 [INFO][2594] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0" iface="eth0" netns="/var/run/netns/cni-0c665028-2d21-744e-27d5-11a925e5c820" May 17 00:52:28.190315 env[1446]: 2025-05-17 00:52:28.153 [INFO][2594] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0" iface="eth0" netns="/var/run/netns/cni-0c665028-2d21-744e-27d5-11a925e5c820" May 17 00:52:28.190315 env[1446]: 2025-05-17 00:52:28.153 [INFO][2594] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0" May 17 00:52:28.190315 env[1446]: 2025-05-17 00:52:28.153 [INFO][2594] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0" May 17 00:52:28.190315 env[1446]: 2025-05-17 00:52:28.176 [INFO][2602] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0" HandleID="k8s-pod-network.8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0" Workload="10.200.20.32-k8s-csi--node--driver--92l2r-eth0" May 17 00:52:28.190315 env[1446]: 2025-05-17 00:52:28.176 [INFO][2602] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:52:28.190315 env[1446]: 2025-05-17 00:52:28.176 [INFO][2602] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:52:28.190315 env[1446]: 2025-05-17 00:52:28.185 [WARNING][2602] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0" HandleID="k8s-pod-network.8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0" Workload="10.200.20.32-k8s-csi--node--driver--92l2r-eth0" May 17 00:52:28.190315 env[1446]: 2025-05-17 00:52:28.185 [INFO][2602] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0" HandleID="k8s-pod-network.8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0" Workload="10.200.20.32-k8s-csi--node--driver--92l2r-eth0" May 17 00:52:28.190315 env[1446]: 2025-05-17 00:52:28.186 [INFO][2602] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:52:28.190315 env[1446]: 2025-05-17 00:52:28.188 [INFO][2594] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0" May 17 00:52:28.192671 systemd[1]: run-netns-cni\x2d0c665028\x2d2d21\x2d744e\x2d27d5\x2d11a925e5c820.mount: Deactivated successfully. May 17 00:52:28.192984 env[1446]: time="2025-05-17T00:52:28.192944359Z" level=info msg="TearDown network for sandbox \"8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0\" successfully" May 17 00:52:28.193126 env[1446]: time="2025-05-17T00:52:28.193108289Z" level=info msg="StopPodSandbox for \"8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0\" returns successfully" May 17 00:52:28.194020 env[1446]: time="2025-05-17T00:52:28.193971017Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-92l2r,Uid:1f904db8-53aa-4690-87de-f3596ea62196,Namespace:calico-system,Attempt:1,}" May 17 00:52:28.297316 kubelet[1912]: I0517 00:52:28.296859 1912 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-x2hlm" podStartSLOduration=7.188160958 podStartE2EDuration="39.29683787s" podCreationTimestamp="2025-05-17 00:51:49 +0000 UTC" firstStartedPulling="2025-05-17 00:51:55.198797976 +0000 UTC m=+7.877650412" lastFinishedPulling="2025-05-17 00:52:27.307474888 +0000 UTC m=+39.986327324" observedRunningTime="2025-05-17 00:52:28.296615338 +0000 UTC m=+40.975467734" watchObservedRunningTime="2025-05-17 00:52:28.29683787 +0000 UTC m=+40.975690306" May 17 00:52:28.428157 systemd-networkd[1608]: cali02fa670cda3: Link UP May 17 00:52:28.437307 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:52:28.437410 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali02fa670cda3: link becomes ready May 17 00:52:28.438500 systemd-networkd[1608]: cali02fa670cda3: Gained carrier May 17 00:52:28.453651 env[1446]: 2025-05-17 00:52:28.278 [INFO][2608] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 17 00:52:28.453651 env[1446]: 2025-05-17 00:52:28.308 [INFO][2608] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.32-k8s-csi--node--driver--92l2r-eth0 csi-node-driver- calico-system 1f904db8-53aa-4690-87de-f3596ea62196 1584 0 2025-05-17 00:51:49 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:78f6f74485 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.200.20.32 csi-node-driver-92l2r eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali02fa670cda3 [] [] }} ContainerID="c09ef24b0811669050bcde95097d553f69c045c4a2c00b2f9f83be0085a26022" Namespace="calico-system" Pod="csi-node-driver-92l2r" WorkloadEndpoint="10.200.20.32-k8s-csi--node--driver--92l2r-" May 17 00:52:28.453651 env[1446]: 2025-05-17 00:52:28.308 [INFO][2608] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="c09ef24b0811669050bcde95097d553f69c045c4a2c00b2f9f83be0085a26022" Namespace="calico-system" Pod="csi-node-driver-92l2r" WorkloadEndpoint="10.200.20.32-k8s-csi--node--driver--92l2r-eth0" May 17 00:52:28.453651 env[1446]: 2025-05-17 00:52:28.351 [INFO][2643] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c09ef24b0811669050bcde95097d553f69c045c4a2c00b2f9f83be0085a26022" HandleID="k8s-pod-network.c09ef24b0811669050bcde95097d553f69c045c4a2c00b2f9f83be0085a26022" Workload="10.200.20.32-k8s-csi--node--driver--92l2r-eth0" May 17 00:52:28.453651 env[1446]: 2025-05-17 00:52:28.351 [INFO][2643] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c09ef24b0811669050bcde95097d553f69c045c4a2c00b2f9f83be0085a26022" HandleID="k8s-pod-network.c09ef24b0811669050bcde95097d553f69c045c4a2c00b2f9f83be0085a26022" Workload="10.200.20.32-k8s-csi--node--driver--92l2r-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400022fb30), Attrs:map[string]string{"namespace":"calico-system", "node":"10.200.20.32", "pod":"csi-node-driver-92l2r", "timestamp":"2025-05-17 00:52:28.351466915 +0000 UTC"}, Hostname:"10.200.20.32", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:52:28.453651 env[1446]: 2025-05-17 00:52:28.351 [INFO][2643] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:52:28.453651 env[1446]: 2025-05-17 00:52:28.351 [INFO][2643] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:52:28.453651 env[1446]: 2025-05-17 00:52:28.351 [INFO][2643] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.32' May 17 00:52:28.453651 env[1446]: 2025-05-17 00:52:28.366 [INFO][2643] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.c09ef24b0811669050bcde95097d553f69c045c4a2c00b2f9f83be0085a26022" host="10.200.20.32" May 17 00:52:28.453651 env[1446]: 2025-05-17 00:52:28.371 [INFO][2643] ipam/ipam.go 394: Looking up existing affinities for host host="10.200.20.32" May 17 00:52:28.453651 env[1446]: 2025-05-17 00:52:28.378 [INFO][2643] ipam/ipam.go 511: Trying affinity for 192.168.31.128/26 host="10.200.20.32" May 17 00:52:28.453651 env[1446]: 2025-05-17 00:52:28.382 [INFO][2643] ipam/ipam.go 158: Attempting to load block cidr=192.168.31.128/26 host="10.200.20.32" May 17 00:52:28.453651 env[1446]: 2025-05-17 00:52:28.385 [INFO][2643] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.31.128/26 host="10.200.20.32" May 17 00:52:28.453651 env[1446]: 2025-05-17 00:52:28.385 [INFO][2643] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.31.128/26 handle="k8s-pod-network.c09ef24b0811669050bcde95097d553f69c045c4a2c00b2f9f83be0085a26022" host="10.200.20.32" May 17 00:52:28.453651 env[1446]: 2025-05-17 00:52:28.387 [INFO][2643] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.c09ef24b0811669050bcde95097d553f69c045c4a2c00b2f9f83be0085a26022 May 17 00:52:28.453651 env[1446]: 2025-05-17 00:52:28.391 [INFO][2643] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.31.128/26 handle="k8s-pod-network.c09ef24b0811669050bcde95097d553f69c045c4a2c00b2f9f83be0085a26022" host="10.200.20.32" May 17 00:52:28.453651 env[1446]: 2025-05-17 00:52:28.401 [INFO][2643] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.31.129/26] block=192.168.31.128/26 handle="k8s-pod-network.c09ef24b0811669050bcde95097d553f69c045c4a2c00b2f9f83be0085a26022" host="10.200.20.32" May 17 00:52:28.453651 env[1446]: 2025-05-17 00:52:28.401 [INFO][2643] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.31.129/26] handle="k8s-pod-network.c09ef24b0811669050bcde95097d553f69c045c4a2c00b2f9f83be0085a26022" host="10.200.20.32" May 17 00:52:28.453651 env[1446]: 2025-05-17 00:52:28.401 [INFO][2643] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:52:28.453651 env[1446]: 2025-05-17 00:52:28.401 [INFO][2643] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.31.129/26] IPv6=[] ContainerID="c09ef24b0811669050bcde95097d553f69c045c4a2c00b2f9f83be0085a26022" HandleID="k8s-pod-network.c09ef24b0811669050bcde95097d553f69c045c4a2c00b2f9f83be0085a26022" Workload="10.200.20.32-k8s-csi--node--driver--92l2r-eth0" May 17 00:52:28.454477 env[1446]: 2025-05-17 00:52:28.403 [INFO][2608] cni-plugin/k8s.go 418: Populated endpoint ContainerID="c09ef24b0811669050bcde95097d553f69c045c4a2c00b2f9f83be0085a26022" Namespace="calico-system" Pod="csi-node-driver-92l2r" WorkloadEndpoint="10.200.20.32-k8s-csi--node--driver--92l2r-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.32-k8s-csi--node--driver--92l2r-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1f904db8-53aa-4690-87de-f3596ea62196", ResourceVersion:"1584", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 51, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.32", ContainerID:"", Pod:"csi-node-driver-92l2r", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.31.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali02fa670cda3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:52:28.454477 env[1446]: 2025-05-17 00:52:28.403 [INFO][2608] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.31.129/32] ContainerID="c09ef24b0811669050bcde95097d553f69c045c4a2c00b2f9f83be0085a26022" Namespace="calico-system" Pod="csi-node-driver-92l2r" WorkloadEndpoint="10.200.20.32-k8s-csi--node--driver--92l2r-eth0" May 17 00:52:28.454477 env[1446]: 2025-05-17 00:52:28.403 [INFO][2608] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali02fa670cda3 ContainerID="c09ef24b0811669050bcde95097d553f69c045c4a2c00b2f9f83be0085a26022" Namespace="calico-system" Pod="csi-node-driver-92l2r" WorkloadEndpoint="10.200.20.32-k8s-csi--node--driver--92l2r-eth0" May 17 00:52:28.454477 env[1446]: 2025-05-17 00:52:28.439 [INFO][2608] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c09ef24b0811669050bcde95097d553f69c045c4a2c00b2f9f83be0085a26022" Namespace="calico-system" Pod="csi-node-driver-92l2r" WorkloadEndpoint="10.200.20.32-k8s-csi--node--driver--92l2r-eth0" May 17 00:52:28.454477 env[1446]: 2025-05-17 00:52:28.440 [INFO][2608] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="c09ef24b0811669050bcde95097d553f69c045c4a2c00b2f9f83be0085a26022" Namespace="calico-system" Pod="csi-node-driver-92l2r" WorkloadEndpoint="10.200.20.32-k8s-csi--node--driver--92l2r-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.32-k8s-csi--node--driver--92l2r-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1f904db8-53aa-4690-87de-f3596ea62196", ResourceVersion:"1584", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 51, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.32", ContainerID:"c09ef24b0811669050bcde95097d553f69c045c4a2c00b2f9f83be0085a26022", Pod:"csi-node-driver-92l2r", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.31.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali02fa670cda3", MAC:"f6:3d:58:7b:b2:05", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:52:28.454477 env[1446]: 2025-05-17 00:52:28.451 [INFO][2608] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="c09ef24b0811669050bcde95097d553f69c045c4a2c00b2f9f83be0085a26022" Namespace="calico-system" Pod="csi-node-driver-92l2r" WorkloadEndpoint="10.200.20.32-k8s-csi--node--driver--92l2r-eth0" May 17 00:52:28.465921 env[1446]: time="2025-05-17T00:52:28.465841690Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:52:28.466140 env[1446]: time="2025-05-17T00:52:28.466115106Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:52:28.466240 env[1446]: time="2025-05-17T00:52:28.466219111Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:52:28.466524 env[1446]: time="2025-05-17T00:52:28.466492887Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c09ef24b0811669050bcde95097d553f69c045c4a2c00b2f9f83be0085a26022 pid=2681 runtime=io.containerd.runc.v2 May 17 00:52:28.478270 systemd[1]: Started cri-containerd-c09ef24b0811669050bcde95097d553f69c045c4a2c00b2f9f83be0085a26022.scope. May 17 00:52:28.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:28.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:28.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:28.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:28.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:28.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:28.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:28.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:28.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:28.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:28.491000 audit: BPF prog-id=82 op=LOAD May 17 00:52:28.492000 audit[2692]: AVC avc: denied { bpf } for pid=2692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:28.492000 audit[2692]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=2681 pid=2692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:28.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330396566323462303831313636393035306263646539353039376435 May 17 00:52:28.492000 audit[2692]: AVC avc: denied { perfmon } for pid=2692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:28.492000 audit[2692]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=2681 pid=2692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:28.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330396566323462303831313636393035306263646539353039376435 May 17 00:52:28.493000 audit[2692]: AVC avc: denied { bpf } for pid=2692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:28.493000 audit[2692]: AVC avc: denied { bpf } for pid=2692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:28.493000 audit[2692]: AVC avc: denied { bpf } for pid=2692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:28.493000 audit[2692]: AVC avc: denied { perfmon } for pid=2692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:28.493000 audit[2692]: AVC avc: denied { perfmon } for pid=2692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:28.493000 audit[2692]: AVC avc: denied { perfmon } for pid=2692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:28.493000 audit[2692]: AVC avc: denied { perfmon } for pid=2692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:28.493000 audit[2692]: AVC avc: denied { perfmon } for pid=2692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:28.493000 audit[2692]: AVC avc: denied { bpf } for pid=2692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:28.493000 audit[2692]: AVC avc: denied { bpf } for pid=2692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:28.493000 audit: BPF prog-id=83 op=LOAD May 17 00:52:28.493000 audit[2692]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=2681 pid=2692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:28.493000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330396566323462303831313636393035306263646539353039376435 May 17 00:52:28.493000 audit[2692]: AVC avc: denied { bpf } for pid=2692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:28.493000 audit[2692]: AVC avc: denied { bpf } for pid=2692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:28.493000 audit[2692]: AVC avc: denied { perfmon } for pid=2692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:28.493000 audit[2692]: AVC avc: denied { perfmon } for pid=2692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:28.493000 audit[2692]: AVC avc: denied { perfmon } for pid=2692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:28.493000 audit[2692]: AVC avc: denied { perfmon } for pid=2692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:28.493000 audit[2692]: AVC avc: denied { perfmon } for pid=2692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:28.493000 audit[2692]: AVC avc: denied { bpf } for pid=2692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:28.493000 audit[2692]: AVC avc: denied { bpf } for pid=2692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:28.493000 audit: BPF prog-id=84 op=LOAD May 17 00:52:28.493000 audit[2692]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=2681 pid=2692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:28.493000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330396566323462303831313636393035306263646539353039376435 May 17 00:52:28.494000 audit: BPF prog-id=84 op=UNLOAD May 17 00:52:28.494000 audit: BPF prog-id=83 op=UNLOAD May 17 00:52:28.494000 audit[2692]: AVC avc: denied { bpf } for pid=2692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:28.494000 audit[2692]: AVC avc: denied { bpf } for pid=2692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:28.494000 audit[2692]: AVC avc: denied { bpf } for pid=2692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:28.494000 audit[2692]: AVC avc: denied { perfmon } for pid=2692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:28.494000 audit[2692]: AVC avc: denied { perfmon } for pid=2692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:28.494000 audit[2692]: AVC avc: denied { perfmon } for pid=2692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:28.494000 audit[2692]: AVC avc: denied { perfmon } for pid=2692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:28.494000 audit[2692]: AVC avc: denied { perfmon } for pid=2692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:28.494000 audit[2692]: AVC avc: denied { bpf } for pid=2692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:28.494000 audit[2692]: AVC avc: denied { bpf } for pid=2692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:28.494000 audit: BPF prog-id=85 op=LOAD May 17 00:52:28.494000 audit[2692]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=2681 pid=2692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:28.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330396566323462303831313636393035306263646539353039376435 May 17 00:52:28.508260 env[1446]: time="2025-05-17T00:52:28.508214572Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-92l2r,Uid:1f904db8-53aa-4690-87de-f3596ea62196,Namespace:calico-system,Attempt:1,} returns sandbox id \"c09ef24b0811669050bcde95097d553f69c045c4a2c00b2f9f83be0085a26022\"" May 17 00:52:28.509951 env[1446]: time="2025-05-17T00:52:28.509914027Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\"" May 17 00:52:28.975782 kubelet[1912]: E0517 00:52:28.975724 1912 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:29.008191 kubelet[1912]: E0517 00:52:29.008150 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:29.071798 systemd[1]: run-containerd-runc-k8s.io-7b4233ed62f268ef89ea5a06e88433db7100c8a19c0f9bd16738ae6ea0b34595-runc.W9X1ZZ.mount: Deactivated successfully. May 17 00:52:29.290367 systemd[1]: run-containerd-runc-k8s.io-7b4233ed62f268ef89ea5a06e88433db7100c8a19c0f9bd16738ae6ea0b34595-runc.RFKz3D.mount: Deactivated successfully. May 17 00:52:29.415000 audit[2772]: AVC avc: denied { write } for pid=2772 comm="tee" name="fd" dev="proc" ino=17393 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:52:29.415000 audit[2772]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd8ba67dd a2=241 a3=1b6 items=1 ppid=2747 pid=2772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:29.415000 audit: CWD cwd="/etc/service/enabled/cni/log" May 17 00:52:29.415000 audit: PATH item=0 name="/dev/fd/63" inode=17384 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:52:29.415000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:52:29.445000 audit[2803]: AVC avc: denied { write } for pid=2803 comm="tee" name="fd" dev="proc" ino=19465 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:52:29.446000 audit[2805]: AVC avc: denied { write } for pid=2805 comm="tee" name="fd" dev="proc" ino=19468 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:52:29.445000 audit[2803]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdd9fa7cc a2=241 a3=1b6 items=1 ppid=2774 pid=2803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:29.445000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 17 00:52:29.445000 audit: PATH item=0 name="/dev/fd/63" inode=19457 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:52:29.445000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:52:29.446000 audit[2805]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd623e7db a2=241 a3=1b6 items=1 ppid=2773 pid=2805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:29.446000 audit: CWD cwd="/etc/service/enabled/confd/log" May 17 00:52:29.446000 audit: PATH item=0 name="/dev/fd/63" inode=19458 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:52:29.446000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:52:29.465000 audit[2811]: AVC avc: denied { write } for pid=2811 comm="tee" name="fd" dev="proc" ino=18648 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:52:29.465000 audit[2811]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffeff2c7db a2=241 a3=1b6 items=1 ppid=2770 pid=2811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:29.465000 audit: CWD cwd="/etc/service/enabled/felix/log" May 17 00:52:29.465000 audit: PATH item=0 name="/dev/fd/63" inode=18640 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:52:29.465000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:52:29.467000 audit[2817]: AVC avc: denied { write } for pid=2817 comm="tee" name="fd" dev="proc" ino=18652 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:52:29.467000 audit[2817]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc6cd17db a2=241 a3=1b6 items=1 ppid=2763 pid=2817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:29.467000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 17 00:52:29.467000 audit: PATH item=0 name="/dev/fd/63" inode=18644 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:52:29.467000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:52:29.469000 audit[2819]: AVC avc: denied { write } for pid=2819 comm="tee" name="fd" dev="proc" ino=18656 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:52:29.469000 audit[2819]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc93797cb a2=241 a3=1b6 items=1 ppid=2767 pid=2819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:29.469000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 17 00:52:29.469000 audit: PATH item=0 name="/dev/fd/63" inode=18645 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:52:29.469000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:52:29.473000 audit[2813]: AVC avc: denied { write } for pid=2813 comm="tee" name="fd" dev="proc" ino=19473 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:52:29.473000 audit[2813]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc763b7dc a2=241 a3=1b6 items=1 ppid=2764 pid=2813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:29.473000 audit: CWD cwd="/etc/service/enabled/bird/log" May 17 00:52:29.473000 audit: PATH item=0 name="/dev/fd/63" inode=18641 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:52:29.473000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:52:29.702000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.702000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.702000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.702000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.702000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.702000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.702000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.702000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.702000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.702000 audit: BPF prog-id=86 op=LOAD May 17 00:52:29.702000 audit[2857]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd0e709b8 a2=98 a3=ffffd0e709a8 items=0 ppid=2771 pid=2857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:29.702000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:52:29.702000 audit: BPF prog-id=86 op=UNLOAD May 17 00:52:29.702000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.702000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.702000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.702000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.702000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.702000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.702000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.702000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.702000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.702000 audit: BPF prog-id=87 op=LOAD May 17 00:52:29.702000 audit[2857]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd0e70648 a2=74 a3=95 items=0 ppid=2771 pid=2857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:29.702000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:52:29.704000 audit: BPF prog-id=87 op=UNLOAD May 17 00:52:29.704000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.704000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.704000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.704000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.704000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.704000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.704000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.704000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.704000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.704000 audit: BPF prog-id=88 op=LOAD May 17 00:52:29.704000 audit[2857]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd0e706a8 a2=94 a3=2 items=0 ppid=2771 pid=2857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:29.704000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:52:29.704000 audit: BPF prog-id=88 op=UNLOAD May 17 00:52:29.798000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.798000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.798000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.798000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.798000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.798000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.798000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.798000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.798000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.798000 audit: BPF prog-id=89 op=LOAD May 17 00:52:29.798000 audit[2857]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd0e70668 a2=40 a3=ffffd0e70698 items=0 ppid=2771 pid=2857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:29.798000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:52:29.798000 audit: BPF prog-id=89 op=UNLOAD May 17 00:52:29.798000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.798000 audit[2857]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffd0e70780 a2=50 a3=0 items=0 ppid=2771 pid=2857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:29.798000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:52:29.806000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.806000 audit[2857]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd0e706d8 a2=28 a3=ffffd0e70808 items=0 ppid=2771 pid=2857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:29.806000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:52:29.806000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.806000 audit[2857]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd0e70708 a2=28 a3=ffffd0e70838 items=0 ppid=2771 pid=2857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:29.806000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:52:29.806000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.806000 audit[2857]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd0e705b8 a2=28 a3=ffffd0e706e8 items=0 ppid=2771 pid=2857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:29.806000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:52:29.806000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.806000 audit[2857]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd0e70728 a2=28 a3=ffffd0e70858 items=0 ppid=2771 pid=2857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:29.806000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:52:29.806000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.806000 audit[2857]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd0e70708 a2=28 a3=ffffd0e70838 items=0 ppid=2771 pid=2857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:29.806000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:52:29.806000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.806000 audit[2857]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd0e706f8 a2=28 a3=ffffd0e70828 items=0 ppid=2771 pid=2857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:29.806000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:52:29.806000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.806000 audit[2857]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd0e70728 a2=28 a3=ffffd0e70858 items=0 ppid=2771 pid=2857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:29.806000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:52:29.806000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.806000 audit[2857]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd0e70708 a2=28 a3=ffffd0e70838 items=0 ppid=2771 pid=2857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:29.806000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:52:29.806000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.806000 audit[2857]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd0e70728 a2=28 a3=ffffd0e70858 items=0 ppid=2771 pid=2857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:29.806000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:52:29.806000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.806000 audit[2857]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd0e706f8 a2=28 a3=ffffd0e70828 items=0 ppid=2771 pid=2857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:29.806000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:52:29.806000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.806000 audit[2857]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd0e70778 a2=28 a3=ffffd0e708b8 items=0 ppid=2771 pid=2857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:29.806000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:52:29.807000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.807000 audit[2857]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffd0e704b0 a2=50 a3=0 items=0 ppid=2771 pid=2857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:29.807000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:52:29.807000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.807000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.807000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.807000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.807000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.807000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.807000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.807000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.807000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.807000 audit: BPF prog-id=90 op=LOAD May 17 00:52:29.807000 audit[2857]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffd0e704b8 a2=94 a3=5 items=0 ppid=2771 pid=2857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:29.807000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:52:29.807000 audit: BPF prog-id=90 op=UNLOAD May 17 00:52:29.807000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.807000 audit[2857]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffd0e705c0 a2=50 a3=0 items=0 ppid=2771 pid=2857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:29.807000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:52:29.807000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.807000 audit[2857]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffd0e70708 a2=4 a3=3 items=0 ppid=2771 pid=2857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:29.807000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:52:29.807000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.807000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.807000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.807000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.807000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.807000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.807000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.807000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.807000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.807000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.807000 audit[2857]: AVC avc: denied { confidentiality } for pid=2857 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:52:29.807000 audit[2857]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd0e706e8 a2=94 a3=6 items=0 ppid=2771 pid=2857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:29.807000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:52:29.807000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.807000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.807000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.807000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.807000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.807000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.807000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.807000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.807000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.807000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.807000 audit[2857]: AVC avc: denied { confidentiality } for pid=2857 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:52:29.807000 audit[2857]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd0e6feb8 a2=94 a3=83 items=0 ppid=2771 pid=2857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:29.807000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:52:29.807000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.807000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.807000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.807000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.807000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.807000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.807000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.807000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.807000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.807000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.807000 audit[2857]: AVC avc: denied { confidentiality } for pid=2857 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:52:29.807000 audit[2857]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd0e6feb8 a2=94 a3=83 items=0 ppid=2771 pid=2857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:29.807000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:52:29.816000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.816000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.816000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.816000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.816000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.816000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.816000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.816000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.816000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.816000 audit: BPF prog-id=91 op=LOAD May 17 00:52:29.816000 audit[2860]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff5fe6ae8 a2=98 a3=fffff5fe6ad8 items=0 ppid=2771 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:29.816000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:52:29.816000 audit: BPF prog-id=91 op=UNLOAD May 17 00:52:29.816000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.816000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.816000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.816000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.816000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.816000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.816000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.816000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.816000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.816000 audit: BPF prog-id=92 op=LOAD May 17 00:52:29.816000 audit[2860]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff5fe6998 a2=74 a3=95 items=0 ppid=2771 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:29.816000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:52:29.816000 audit: BPF prog-id=92 op=UNLOAD May 17 00:52:29.816000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.816000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.816000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.816000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.816000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.816000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.816000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.816000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.816000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.816000 audit: BPF prog-id=93 op=LOAD May 17 00:52:29.816000 audit[2860]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff5fe69c8 a2=40 a3=fffff5fe69f8 items=0 ppid=2771 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:29.816000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:52:29.816000 audit: BPF prog-id=93 op=UNLOAD May 17 00:52:29.871710 env[1446]: time="2025-05-17T00:52:29.871660206Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:52:29.882811 env[1446]: time="2025-05-17T00:52:29.882657485Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ebe7e098653491dec9f15f87d7f5d33f47b09d1d6f3ef83deeaaa6237024c045,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:52:29.889095 env[1446]: time="2025-05-17T00:52:29.889057193Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:52:29.895158 systemd-networkd[1608]: cali02fa670cda3: Gained IPv6LL May 17 00:52:29.897670 env[1446]: time="2025-05-17T00:52:29.897636379Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:27883a4104876fe239311dd93ce6efd0c4a87de7163d57a4c8d96bd65a287ffd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:52:29.898442 env[1446]: time="2025-05-17T00:52:29.898414422Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\" returns image reference \"sha256:ebe7e098653491dec9f15f87d7f5d33f47b09d1d6f3ef83deeaaa6237024c045\"" May 17 00:52:29.909000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.909000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.909000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.909000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.909000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.909000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.909000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.909000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.909000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.909000 audit: BPF prog-id=94 op=LOAD May 17 00:52:29.909000 audit[2885]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd3b90468 a2=98 a3=ffffd3b90458 items=0 ppid=2771 pid=2885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:29.909000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:52:29.909000 audit: BPF prog-id=94 op=UNLOAD May 17 00:52:29.909000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.909000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.909000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.909000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.909000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.909000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.909000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.909000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.909000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.909000 audit: BPF prog-id=95 op=LOAD May 17 00:52:29.909000 audit[2885]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd3b90148 a2=74 a3=95 items=0 ppid=2771 pid=2885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:29.909000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:52:29.909000 audit: BPF prog-id=95 op=UNLOAD May 17 00:52:29.909000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.909000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.909000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.909000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.909000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.909000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.909000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.909000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.909000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.909000 audit: BPF prog-id=96 op=LOAD May 17 00:52:29.909000 audit[2885]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd3b901a8 a2=94 a3=2 items=0 ppid=2771 pid=2885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:29.909000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:52:29.909000 audit: BPF prog-id=96 op=UNLOAD May 17 00:52:29.909000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.909000 audit[2885]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffd3b901d8 a2=28 a3=ffffd3b90308 items=0 ppid=2771 pid=2885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:29.909000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:52:29.909000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.909000 audit[2885]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd3b90208 a2=28 a3=ffffd3b90338 items=0 ppid=2771 pid=2885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:29.909000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:52:29.909000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.909000 audit[2885]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd3b900b8 a2=28 a3=ffffd3b901e8 items=0 ppid=2771 pid=2885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:29.909000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:52:29.909000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.909000 audit[2885]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffd3b90228 a2=28 a3=ffffd3b90358 items=0 ppid=2771 pid=2885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:29.909000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:52:29.910000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.910000 audit[2885]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffd3b90208 a2=28 a3=ffffd3b90338 items=0 ppid=2771 pid=2885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:29.910000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:52:29.910000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.910000 audit[2885]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffd3b901f8 a2=28 a3=ffffd3b90328 items=0 ppid=2771 pid=2885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:29.910000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:52:29.910000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.910000 audit[2885]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffd3b90228 a2=28 a3=ffffd3b90358 items=0 ppid=2771 pid=2885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:29.910000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:52:29.910000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.910000 audit[2885]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd3b90208 a2=28 a3=ffffd3b90338 items=0 ppid=2771 pid=2885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:29.910000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:52:29.910000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.910000 audit[2885]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd3b90228 a2=28 a3=ffffd3b90358 items=0 ppid=2771 pid=2885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:29.910000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:52:29.910000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.910000 audit[2885]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd3b901f8 a2=28 a3=ffffd3b90328 items=0 ppid=2771 pid=2885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:29.910000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:52:29.910000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.910000 audit[2885]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffd3b90278 a2=28 a3=ffffd3b903b8 items=0 ppid=2771 pid=2885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:29.910000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:52:29.910000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.910000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.910000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.910000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.910000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.910000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.910000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.910000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.910000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.910000 audit: BPF prog-id=97 op=LOAD May 17 00:52:29.910000 audit[2885]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffd3b90098 a2=40 a3=ffffd3b900c8 items=0 ppid=2771 pid=2885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:29.910000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:52:29.910000 audit: BPF prog-id=97 op=UNLOAD May 17 00:52:29.910000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.910000 audit[2885]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffd3b900c0 a2=50 a3=0 items=0 ppid=2771 pid=2885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:29.910000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:52:29.910000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.910000 audit[2885]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=ffffd3b900c0 a2=50 a3=0 items=0 ppid=2771 pid=2885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:29.910000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:52:29.910000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.910000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.910000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.910000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.910000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.910000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.910000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.910000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.910000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.910000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.910000 audit: BPF prog-id=98 op=LOAD May 17 00:52:29.910000 audit[2885]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffd3b8f828 a2=94 a3=2 items=0 ppid=2771 pid=2885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:29.910000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:52:29.910000 audit: BPF prog-id=98 op=UNLOAD May 17 00:52:29.910000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.910000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.910000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.910000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.910000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.910000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.910000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.910000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.910000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.910000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.910000 audit: BPF prog-id=99 op=LOAD May 17 00:52:29.910000 audit[2885]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffd3b8f9b8 a2=94 a3=30 items=0 ppid=2771 pid=2885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:29.910000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:52:29.914000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.914000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.914000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.914000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.914000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.914000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.914000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.914000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.914000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.914000 audit: BPF prog-id=100 op=LOAD May 17 00:52:29.914000 audit[2887]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffccad84c8 a2=98 a3=ffffccad84b8 items=0 ppid=2771 pid=2887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:29.914000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:52:29.914000 audit: BPF prog-id=100 op=UNLOAD May 17 00:52:29.914000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.914000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.914000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.914000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.914000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.914000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.914000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.914000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.914000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.914000 audit: BPF prog-id=101 op=LOAD May 17 00:52:29.914000 audit[2887]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffccad8158 a2=74 a3=95 items=0 ppid=2771 pid=2887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:29.914000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:52:29.914000 audit: BPF prog-id=101 op=UNLOAD May 17 00:52:29.914000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.914000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.914000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.914000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.914000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.914000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.914000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.914000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.914000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:29.914000 audit: BPF prog-id=102 op=LOAD May 17 00:52:29.914000 audit[2887]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffccad81b8 a2=94 a3=2 items=0 ppid=2771 pid=2887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:29.914000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:52:29.914000 audit: BPF prog-id=102 op=UNLOAD May 17 00:52:29.922319 env[1446]: time="2025-05-17T00:52:29.915453029Z" level=info msg="CreateContainer within sandbox \"c09ef24b0811669050bcde95097d553f69c045c4a2c00b2f9f83be0085a26022\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 17 00:52:29.937373 systemd-networkd[1608]: vxlan.calico: Link UP May 17 00:52:29.937381 systemd-networkd[1608]: vxlan.calico: Gained carrier May 17 00:52:29.988980 env[1446]: time="2025-05-17T00:52:29.988917345Z" level=info msg="CreateContainer within sandbox \"c09ef24b0811669050bcde95097d553f69c045c4a2c00b2f9f83be0085a26022\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"a81889a2c943b9ead165af1030fa3079d8124eea3dd7dceef5585aaf018ad25d\"" May 17 00:52:29.990043 env[1446]: time="2025-05-17T00:52:29.989983723Z" level=info msg="StartContainer for \"a81889a2c943b9ead165af1030fa3079d8124eea3dd7dceef5585aaf018ad25d\"" May 17 00:52:30.006423 systemd[1]: Started cri-containerd-a81889a2c943b9ead165af1030fa3079d8124eea3dd7dceef5585aaf018ad25d.scope. May 17 00:52:30.008845 kubelet[1912]: E0517 00:52:30.008804 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:30.032000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.032000 audit[2900]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2681 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:30.032000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138313838396132633934336239656164313635616631303330666133 May 17 00:52:30.032000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.032000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.032000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.032000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.032000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.032000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.032000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.032000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.032000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.032000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.032000 audit: BPF prog-id=103 op=LOAD May 17 00:52:30.032000 audit[2900]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2681 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:30.032000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138313838396132633934336239656164313635616631303330666133 May 17 00:52:30.032000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.032000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.032000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.032000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.032000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.032000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.032000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.032000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.032000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.032000 audit: BPF prog-id=104 op=LOAD May 17 00:52:30.032000 audit[2900]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2681 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:30.032000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138313838396132633934336239656164313635616631303330666133 May 17 00:52:30.032000 audit: BPF prog-id=104 op=UNLOAD May 17 00:52:30.032000 audit: BPF prog-id=103 op=UNLOAD May 17 00:52:30.032000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.032000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.032000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.032000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.032000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.032000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.032000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.032000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.032000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.032000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.032000 audit: BPF prog-id=105 op=LOAD May 17 00:52:30.032000 audit[2900]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2681 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:30.032000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138313838396132633934336239656164313635616631303330666133 May 17 00:52:30.046000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.046000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.046000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.046000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.046000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.046000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.046000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.046000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.046000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.046000 audit: BPF prog-id=106 op=LOAD May 17 00:52:30.046000 audit[2887]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffccad8178 a2=40 a3=ffffccad81a8 items=0 ppid=2771 pid=2887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:30.046000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:52:30.047000 audit: BPF prog-id=106 op=UNLOAD May 17 00:52:30.047000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.047000 audit[2887]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffccad8290 a2=50 a3=0 items=0 ppid=2771 pid=2887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:30.047000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:52:30.058122 env[1446]: time="2025-05-17T00:52:30.058056873Z" level=info msg="StartContainer for \"a81889a2c943b9ead165af1030fa3079d8124eea3dd7dceef5585aaf018ad25d\" returns successfully" May 17 00:52:30.059942 env[1446]: time="2025-05-17T00:52:30.059852008Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\"" May 17 00:52:30.060000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.060000 audit[2887]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffccad81e8 a2=28 a3=ffffccad8318 items=0 ppid=2771 pid=2887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:30.060000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:52:30.060000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.060000 audit[2887]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffccad8218 a2=28 a3=ffffccad8348 items=0 ppid=2771 pid=2887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:30.060000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:52:30.060000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.060000 audit[2887]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffccad80c8 a2=28 a3=ffffccad81f8 items=0 ppid=2771 pid=2887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:30.060000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:52:30.060000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.060000 audit[2887]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffccad8238 a2=28 a3=ffffccad8368 items=0 ppid=2771 pid=2887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:30.060000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:52:30.060000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.060000 audit[2887]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffccad8218 a2=28 a3=ffffccad8348 items=0 ppid=2771 pid=2887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:30.060000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:52:30.060000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.060000 audit[2887]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffccad8208 a2=28 a3=ffffccad8338 items=0 ppid=2771 pid=2887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:30.060000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:52:30.060000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.060000 audit[2887]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffccad8238 a2=28 a3=ffffccad8368 items=0 ppid=2771 pid=2887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:30.060000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:52:30.060000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.060000 audit[2887]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffccad8218 a2=28 a3=ffffccad8348 items=0 ppid=2771 pid=2887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:30.060000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:52:30.060000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.060000 audit[2887]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffccad8238 a2=28 a3=ffffccad8368 items=0 ppid=2771 pid=2887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:30.060000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:52:30.060000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.060000 audit[2887]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffccad8208 a2=28 a3=ffffccad8338 items=0 ppid=2771 pid=2887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:30.060000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:52:30.060000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.060000 audit[2887]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffccad8288 a2=28 a3=ffffccad83c8 items=0 ppid=2771 pid=2887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:30.060000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:52:30.060000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.060000 audit[2887]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffccad7fc0 a2=50 a3=0 items=0 ppid=2771 pid=2887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:30.060000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:52:30.060000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.060000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.060000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.060000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.060000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.060000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.060000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.060000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.060000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.060000 audit: BPF prog-id=107 op=LOAD May 17 00:52:30.060000 audit[2887]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffccad7fc8 a2=94 a3=5 items=0 ppid=2771 pid=2887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:30.060000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:52:30.061000 audit: BPF prog-id=107 op=UNLOAD May 17 00:52:30.061000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.061000 audit[2887]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffccad80d0 a2=50 a3=0 items=0 ppid=2771 pid=2887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:30.061000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:52:30.061000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.061000 audit[2887]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffccad8218 a2=4 a3=3 items=0 ppid=2771 pid=2887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:30.061000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:52:30.061000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.061000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.061000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.061000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.061000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.061000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.061000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.061000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.061000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.061000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.061000 audit[2887]: AVC avc: denied { confidentiality } for pid=2887 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:52:30.061000 audit[2887]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffccad81f8 a2=94 a3=6 items=0 ppid=2771 pid=2887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:30.061000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:52:30.061000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.061000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.061000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.061000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.061000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.061000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.061000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.061000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.061000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.061000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.061000 audit[2887]: AVC avc: denied { confidentiality } for pid=2887 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:52:30.061000 audit[2887]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffccad79c8 a2=94 a3=83 items=0 ppid=2771 pid=2887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:30.061000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:52:30.061000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.061000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.061000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.061000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.061000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.061000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.061000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.061000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.061000 audit[2887]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffccad79c8 a2=94 a3=83 items=0 ppid=2771 pid=2887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:30.061000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:52:30.062000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.062000 audit[2887]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffccad9408 a2=10 a3=ffffccad94f8 items=0 ppid=2771 pid=2887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:30.062000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:52:30.062000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.062000 audit[2887]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffccad92c8 a2=10 a3=ffffccad93b8 items=0 ppid=2771 pid=2887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:30.062000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:52:30.062000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.062000 audit[2887]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffccad9238 a2=10 a3=ffffccad93b8 items=0 ppid=2771 pid=2887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:30.062000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:52:30.062000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.062000 audit[2887]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffccad9238 a2=10 a3=ffffccad93b8 items=0 ppid=2771 pid=2887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:30.062000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:52:30.071000 audit: BPF prog-id=99 op=UNLOAD May 17 00:52:30.092799 env[1446]: time="2025-05-17T00:52:30.092743755Z" level=info msg="StopPodSandbox for \"1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b\"" May 17 00:52:30.183250 env[1446]: 2025-05-17 00:52:30.143 [INFO][2945] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b" May 17 00:52:30.183250 env[1446]: 2025-05-17 00:52:30.144 [INFO][2945] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b" iface="eth0" netns="/var/run/netns/cni-3c3f3891-b8f5-4adc-9478-c3ae6bf78e3f" May 17 00:52:30.183250 env[1446]: 2025-05-17 00:52:30.144 [INFO][2945] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b" iface="eth0" netns="/var/run/netns/cni-3c3f3891-b8f5-4adc-9478-c3ae6bf78e3f" May 17 00:52:30.183250 env[1446]: 2025-05-17 00:52:30.144 [INFO][2945] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b" iface="eth0" netns="/var/run/netns/cni-3c3f3891-b8f5-4adc-9478-c3ae6bf78e3f" May 17 00:52:30.183250 env[1446]: 2025-05-17 00:52:30.144 [INFO][2945] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b" May 17 00:52:30.183250 env[1446]: 2025-05-17 00:52:30.144 [INFO][2945] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b" May 17 00:52:30.183250 env[1446]: 2025-05-17 00:52:30.165 [INFO][2956] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b" HandleID="k8s-pod-network.1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b" Workload="10.200.20.32-k8s-nginx--deployment--7fcdb87857--7fdlz-eth0" May 17 00:52:30.183250 env[1446]: 2025-05-17 00:52:30.165 [INFO][2956] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:52:30.183250 env[1446]: 2025-05-17 00:52:30.166 [INFO][2956] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:52:30.183250 env[1446]: 2025-05-17 00:52:30.179 [WARNING][2956] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b" HandleID="k8s-pod-network.1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b" Workload="10.200.20.32-k8s-nginx--deployment--7fcdb87857--7fdlz-eth0" May 17 00:52:30.183250 env[1446]: 2025-05-17 00:52:30.179 [INFO][2956] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b" HandleID="k8s-pod-network.1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b" Workload="10.200.20.32-k8s-nginx--deployment--7fcdb87857--7fdlz-eth0" May 17 00:52:30.183250 env[1446]: 2025-05-17 00:52:30.180 [INFO][2956] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:52:30.183250 env[1446]: 2025-05-17 00:52:30.181 [INFO][2945] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b" May 17 00:52:30.185073 systemd[1]: run-netns-cni\x2d3c3f3891\x2db8f5\x2d4adc\x2d9478\x2dc3ae6bf78e3f.mount: Deactivated successfully. May 17 00:52:30.186451 env[1446]: time="2025-05-17T00:52:30.186381168Z" level=info msg="TearDown network for sandbox \"1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b\" successfully" May 17 00:52:30.186451 env[1446]: time="2025-05-17T00:52:30.186442651Z" level=info msg="StopPodSandbox for \"1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b\" returns successfully" May 17 00:52:30.187405 env[1446]: time="2025-05-17T00:52:30.187354340Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-7fdlz,Uid:31021edc-d961-4749-968e-cec33d34c54e,Namespace:default,Attempt:1,}" May 17 00:52:30.201000 audit[2971]: NETFILTER_CFG table=mangle:70 family=2 entries=16 op=nft_register_chain pid=2971 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:52:30.201000 audit[2971]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffc567d310 a2=0 a3=ffffafdabfa8 items=0 ppid=2771 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:30.201000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:52:30.219000 audit[2974]: NETFILTER_CFG table=nat:71 family=2 entries=15 op=nft_register_chain pid=2974 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:52:30.219000 audit[2974]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffd022dc40 a2=0 a3=ffffb6931fa8 items=0 ppid=2771 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:30.219000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:52:30.225000 audit[2972]: NETFILTER_CFG table=raw:72 family=2 entries=21 op=nft_register_chain pid=2972 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:52:30.225000 audit[2972]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=ffffe05ac090 a2=0 a3=ffff92e3ffa8 items=0 ppid=2771 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:30.225000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:52:30.235000 audit[2978]: NETFILTER_CFG table=filter:73 family=2 entries=73 op=nft_register_chain pid=2978 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:52:30.235000 audit[2978]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=38620 a0=3 a1=ffffcdd57320 a2=0 a3=ffffa66e8fa8 items=0 ppid=2771 pid=2978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:30.235000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:52:30.377364 systemd-networkd[1608]: calif777c49b887: Link UP May 17 00:52:30.386733 systemd-networkd[1608]: calif777c49b887: Gained carrier May 17 00:52:30.387059 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif777c49b887: link becomes ready May 17 00:52:30.402142 env[1446]: 2025-05-17 00:52:30.283 [INFO][2984] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.32-k8s-nginx--deployment--7fcdb87857--7fdlz-eth0 nginx-deployment-7fcdb87857- default 31021edc-d961-4749-968e-cec33d34c54e 1607 0 2025-05-17 00:52:15 +0000 UTC map[app:nginx pod-template-hash:7fcdb87857 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.32 nginx-deployment-7fcdb87857-7fdlz eth0 default [] [] [kns.default ksa.default.default] calif777c49b887 [] [] }} ContainerID="dff7e0ce630fd5817173a2404e820ba41c20547eaea2ec611127807e81e23f70" Namespace="default" Pod="nginx-deployment-7fcdb87857-7fdlz" WorkloadEndpoint="10.200.20.32-k8s-nginx--deployment--7fcdb87857--7fdlz-" May 17 00:52:30.402142 env[1446]: 2025-05-17 00:52:30.284 [INFO][2984] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="dff7e0ce630fd5817173a2404e820ba41c20547eaea2ec611127807e81e23f70" Namespace="default" Pod="nginx-deployment-7fcdb87857-7fdlz" WorkloadEndpoint="10.200.20.32-k8s-nginx--deployment--7fcdb87857--7fdlz-eth0" May 17 00:52:30.402142 env[1446]: 2025-05-17 00:52:30.310 [INFO][2999] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="dff7e0ce630fd5817173a2404e820ba41c20547eaea2ec611127807e81e23f70" HandleID="k8s-pod-network.dff7e0ce630fd5817173a2404e820ba41c20547eaea2ec611127807e81e23f70" Workload="10.200.20.32-k8s-nginx--deployment--7fcdb87857--7fdlz-eth0" May 17 00:52:30.402142 env[1446]: 2025-05-17 00:52:30.311 [INFO][2999] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="dff7e0ce630fd5817173a2404e820ba41c20547eaea2ec611127807e81e23f70" HandleID="k8s-pod-network.dff7e0ce630fd5817173a2404e820ba41c20547eaea2ec611127807e81e23f70" Workload="10.200.20.32-k8s-nginx--deployment--7fcdb87857--7fdlz-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002cf020), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.32", "pod":"nginx-deployment-7fcdb87857-7fdlz", "timestamp":"2025-05-17 00:52:30.310907422 +0000 UTC"}, Hostname:"10.200.20.32", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:52:30.402142 env[1446]: 2025-05-17 00:52:30.311 [INFO][2999] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:52:30.402142 env[1446]: 2025-05-17 00:52:30.311 [INFO][2999] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:52:30.402142 env[1446]: 2025-05-17 00:52:30.311 [INFO][2999] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.32' May 17 00:52:30.402142 env[1446]: 2025-05-17 00:52:30.326 [INFO][2999] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.dff7e0ce630fd5817173a2404e820ba41c20547eaea2ec611127807e81e23f70" host="10.200.20.32" May 17 00:52:30.402142 env[1446]: 2025-05-17 00:52:30.339 [INFO][2999] ipam/ipam.go 394: Looking up existing affinities for host host="10.200.20.32" May 17 00:52:30.402142 env[1446]: 2025-05-17 00:52:30.345 [INFO][2999] ipam/ipam.go 511: Trying affinity for 192.168.31.128/26 host="10.200.20.32" May 17 00:52:30.402142 env[1446]: 2025-05-17 00:52:30.347 [INFO][2999] ipam/ipam.go 158: Attempting to load block cidr=192.168.31.128/26 host="10.200.20.32" May 17 00:52:30.402142 env[1446]: 2025-05-17 00:52:30.350 [INFO][2999] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.31.128/26 host="10.200.20.32" May 17 00:52:30.402142 env[1446]: 2025-05-17 00:52:30.350 [INFO][2999] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.31.128/26 handle="k8s-pod-network.dff7e0ce630fd5817173a2404e820ba41c20547eaea2ec611127807e81e23f70" host="10.200.20.32" May 17 00:52:30.402142 env[1446]: 2025-05-17 00:52:30.352 [INFO][2999] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.dff7e0ce630fd5817173a2404e820ba41c20547eaea2ec611127807e81e23f70 May 17 00:52:30.402142 env[1446]: 2025-05-17 00:52:30.366 [INFO][2999] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.31.128/26 handle="k8s-pod-network.dff7e0ce630fd5817173a2404e820ba41c20547eaea2ec611127807e81e23f70" host="10.200.20.32" May 17 00:52:30.402142 env[1446]: 2025-05-17 00:52:30.372 [INFO][2999] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.31.130/26] block=192.168.31.128/26 handle="k8s-pod-network.dff7e0ce630fd5817173a2404e820ba41c20547eaea2ec611127807e81e23f70" host="10.200.20.32" May 17 00:52:30.402142 env[1446]: 2025-05-17 00:52:30.372 [INFO][2999] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.31.130/26] handle="k8s-pod-network.dff7e0ce630fd5817173a2404e820ba41c20547eaea2ec611127807e81e23f70" host="10.200.20.32" May 17 00:52:30.402142 env[1446]: 2025-05-17 00:52:30.372 [INFO][2999] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:52:30.402142 env[1446]: 2025-05-17 00:52:30.372 [INFO][2999] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.31.130/26] IPv6=[] ContainerID="dff7e0ce630fd5817173a2404e820ba41c20547eaea2ec611127807e81e23f70" HandleID="k8s-pod-network.dff7e0ce630fd5817173a2404e820ba41c20547eaea2ec611127807e81e23f70" Workload="10.200.20.32-k8s-nginx--deployment--7fcdb87857--7fdlz-eth0" May 17 00:52:30.402735 env[1446]: 2025-05-17 00:52:30.374 [INFO][2984] cni-plugin/k8s.go 418: Populated endpoint ContainerID="dff7e0ce630fd5817173a2404e820ba41c20547eaea2ec611127807e81e23f70" Namespace="default" Pod="nginx-deployment-7fcdb87857-7fdlz" WorkloadEndpoint="10.200.20.32-k8s-nginx--deployment--7fcdb87857--7fdlz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.32-k8s-nginx--deployment--7fcdb87857--7fdlz-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"31021edc-d961-4749-968e-cec33d34c54e", ResourceVersion:"1607", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 52, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.32", ContainerID:"", Pod:"nginx-deployment-7fcdb87857-7fdlz", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.31.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calif777c49b887", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:52:30.402735 env[1446]: 2025-05-17 00:52:30.374 [INFO][2984] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.31.130/32] ContainerID="dff7e0ce630fd5817173a2404e820ba41c20547eaea2ec611127807e81e23f70" Namespace="default" Pod="nginx-deployment-7fcdb87857-7fdlz" WorkloadEndpoint="10.200.20.32-k8s-nginx--deployment--7fcdb87857--7fdlz-eth0" May 17 00:52:30.402735 env[1446]: 2025-05-17 00:52:30.374 [INFO][2984] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calif777c49b887 ContainerID="dff7e0ce630fd5817173a2404e820ba41c20547eaea2ec611127807e81e23f70" Namespace="default" Pod="nginx-deployment-7fcdb87857-7fdlz" WorkloadEndpoint="10.200.20.32-k8s-nginx--deployment--7fcdb87857--7fdlz-eth0" May 17 00:52:30.402735 env[1446]: 2025-05-17 00:52:30.388 [INFO][2984] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="dff7e0ce630fd5817173a2404e820ba41c20547eaea2ec611127807e81e23f70" Namespace="default" Pod="nginx-deployment-7fcdb87857-7fdlz" WorkloadEndpoint="10.200.20.32-k8s-nginx--deployment--7fcdb87857--7fdlz-eth0" May 17 00:52:30.402735 env[1446]: 2025-05-17 00:52:30.388 [INFO][2984] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="dff7e0ce630fd5817173a2404e820ba41c20547eaea2ec611127807e81e23f70" Namespace="default" Pod="nginx-deployment-7fcdb87857-7fdlz" WorkloadEndpoint="10.200.20.32-k8s-nginx--deployment--7fcdb87857--7fdlz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.32-k8s-nginx--deployment--7fcdb87857--7fdlz-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"31021edc-d961-4749-968e-cec33d34c54e", ResourceVersion:"1607", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 52, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.32", ContainerID:"dff7e0ce630fd5817173a2404e820ba41c20547eaea2ec611127807e81e23f70", Pod:"nginx-deployment-7fcdb87857-7fdlz", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.31.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calif777c49b887", MAC:"42:2d:a4:df:ba:a6", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:52:30.402735 env[1446]: 2025-05-17 00:52:30.400 [INFO][2984] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="dff7e0ce630fd5817173a2404e820ba41c20547eaea2ec611127807e81e23f70" Namespace="default" Pod="nginx-deployment-7fcdb87857-7fdlz" WorkloadEndpoint="10.200.20.32-k8s-nginx--deployment--7fcdb87857--7fdlz-eth0" May 17 00:52:30.415000 audit[3013]: NETFILTER_CFG table=filter:74 family=2 entries=42 op=nft_register_chain pid=3013 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:52:30.415000 audit[3013]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22512 a0=3 a1=ffffde23ee50 a2=0 a3=ffff86791fa8 items=0 ppid=2771 pid=3013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:30.415000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:52:30.419191 env[1446]: time="2025-05-17T00:52:30.418790351Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:52:30.419191 env[1446]: time="2025-05-17T00:52:30.418829473Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:52:30.419191 env[1446]: time="2025-05-17T00:52:30.418840514Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:52:30.419191 env[1446]: time="2025-05-17T00:52:30.419031244Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dff7e0ce630fd5817173a2404e820ba41c20547eaea2ec611127807e81e23f70 pid=3023 runtime=io.containerd.runc.v2 May 17 00:52:30.435667 systemd[1]: Started cri-containerd-dff7e0ce630fd5817173a2404e820ba41c20547eaea2ec611127807e81e23f70.scope. May 17 00:52:30.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.452000 audit: BPF prog-id=108 op=LOAD May 17 00:52:30.453000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.453000 audit[3037]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3023 pid=3037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:30.453000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466663765306365363330666435383137313733613234303465383230 May 17 00:52:30.453000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.453000 audit[3037]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3023 pid=3037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:30.453000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466663765306365363330666435383137313733613234303465383230 May 17 00:52:30.453000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.453000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.453000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.453000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.453000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.453000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.453000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.453000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.453000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.453000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.453000 audit: BPF prog-id=109 op=LOAD May 17 00:52:30.453000 audit[3037]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3023 pid=3037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:30.453000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466663765306365363330666435383137313733613234303465383230 May 17 00:52:30.454000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.454000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.454000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.454000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.454000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.454000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.454000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.454000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.454000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.454000 audit: BPF prog-id=110 op=LOAD May 17 00:52:30.454000 audit[3037]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3023 pid=3037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:30.454000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466663765306365363330666435383137313733613234303465383230 May 17 00:52:30.455000 audit: BPF prog-id=110 op=UNLOAD May 17 00:52:30.455000 audit: BPF prog-id=109 op=UNLOAD May 17 00:52:30.455000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.455000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.455000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.455000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.455000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.455000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.455000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.455000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.455000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.455000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:30.455000 audit: BPF prog-id=111 op=LOAD May 17 00:52:30.455000 audit[3037]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3023 pid=3037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:30.455000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466663765306365363330666435383137313733613234303465383230 May 17 00:52:30.481349 env[1446]: time="2025-05-17T00:52:30.481303471Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-7fdlz,Uid:31021edc-d961-4749-968e-cec33d34c54e,Namespace:default,Attempt:1,} returns sandbox id \"dff7e0ce630fd5817173a2404e820ba41c20547eaea2ec611127807e81e23f70\"" May 17 00:52:31.009554 kubelet[1912]: E0517 00:52:31.009508 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:31.367853 systemd-networkd[1608]: vxlan.calico: Gained IPv6LL May 17 00:52:32.009951 kubelet[1912]: E0517 00:52:32.009899 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:32.071226 systemd-networkd[1608]: calif777c49b887: Gained IPv6LL May 17 00:52:32.787856 env[1446]: time="2025-05-17T00:52:32.787789893Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:52:32.799048 env[1446]: time="2025-05-17T00:52:32.798756929Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a5d5f2a68204ed0dbc50f8778616ee92a63c0e342d178a4620e6271484e5c8b2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:52:32.803638 env[1446]: time="2025-05-17T00:52:32.803596774Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:52:32.807840 env[1446]: time="2025-05-17T00:52:32.807798146Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:dca5c16181edde2e860463615523ce457cd9dcfca85b7cfdcd6f3ea7de6f2ac8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:52:32.808267 env[1446]: time="2025-05-17T00:52:32.808230048Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\" returns image reference \"sha256:a5d5f2a68204ed0dbc50f8778616ee92a63c0e342d178a4620e6271484e5c8b2\"" May 17 00:52:32.810676 env[1446]: time="2025-05-17T00:52:32.810345075Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 17 00:52:32.817408 env[1446]: time="2025-05-17T00:52:32.817366511Z" level=info msg="CreateContainer within sandbox \"c09ef24b0811669050bcde95097d553f69c045c4a2c00b2f9f83be0085a26022\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 17 00:52:32.849395 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3157011392.mount: Deactivated successfully. May 17 00:52:32.870109 env[1446]: time="2025-05-17T00:52:32.870057819Z" level=info msg="CreateContainer within sandbox \"c09ef24b0811669050bcde95097d553f69c045c4a2c00b2f9f83be0085a26022\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"9e85e47053655f30922a8071a17c5187daaa7bc714af4c1fd1bc802e0e386221\"" May 17 00:52:32.871289 env[1446]: time="2025-05-17T00:52:32.871226959Z" level=info msg="StartContainer for \"9e85e47053655f30922a8071a17c5187daaa7bc714af4c1fd1bc802e0e386221\"" May 17 00:52:32.898544 systemd[1]: run-containerd-runc-k8s.io-9e85e47053655f30922a8071a17c5187daaa7bc714af4c1fd1bc802e0e386221-runc.GLwXCC.mount: Deactivated successfully. May 17 00:52:32.900142 systemd[1]: Started cri-containerd-9e85e47053655f30922a8071a17c5187daaa7bc714af4c1fd1bc802e0e386221.scope. May 17 00:52:32.939494 kernel: kauditd_printk_skb: 714 callbacks suppressed May 17 00:52:32.939704 kernel: audit: type=1400 audit(1747443152.915:696): avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:32.915000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:32.915000 audit[3072]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2681 pid=3072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:32.967185 kernel: audit: type=1300 audit(1747443152.915:696): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2681 pid=3072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:32.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965383565343730353336353566333039323261383037316131376335 May 17 00:52:32.992351 kernel: audit: type=1327 audit(1747443152.915:696): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965383565343730353336353566333039323261383037316131376335 May 17 00:52:32.915000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:33.010540 kubelet[1912]: E0517 00:52:33.010486 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:32.915000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:33.028764 kernel: audit: type=1400 audit(1747443152.915:697): avc: denied { bpf } for pid=3072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:33.028890 kernel: audit: type=1400 audit(1747443152.915:697): avc: denied { bpf } for pid=3072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:32.915000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:33.047403 kernel: audit: type=1400 audit(1747443152.915:697): avc: denied { bpf } for pid=3072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:32.915000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:33.066470 kernel: audit: type=1400 audit(1747443152.915:697): avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:32.915000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:33.085300 kernel: audit: type=1400 audit(1747443152.915:697): avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:32.915000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:33.103403 kernel: audit: type=1400 audit(1747443152.915:697): avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:33.104028 env[1446]: time="2025-05-17T00:52:33.103906581Z" level=info msg="StartContainer for \"9e85e47053655f30922a8071a17c5187daaa7bc714af4c1fd1bc802e0e386221\" returns successfully" May 17 00:52:32.915000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:33.121627 kernel: audit: type=1400 audit(1747443152.915:697): avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:32.915000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:32.915000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:32.915000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:32.915000 audit: BPF prog-id=112 op=LOAD May 17 00:52:32.915000 audit[3072]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2681 pid=3072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:32.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965383565343730353336353566333039323261383037316131376335 May 17 00:52:32.921000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:32.921000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:32.921000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:32.921000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:32.921000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:32.921000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:32.921000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:32.921000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:32.921000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:32.921000 audit: BPF prog-id=113 op=LOAD May 17 00:52:32.921000 audit[3072]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2681 pid=3072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:32.921000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965383565343730353336353566333039323261383037316131376335 May 17 00:52:32.938000 audit: BPF prog-id=113 op=UNLOAD May 17 00:52:32.938000 audit: BPF prog-id=112 op=UNLOAD May 17 00:52:32.938000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:32.938000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:32.938000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:32.938000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:32.938000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:32.938000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:32.938000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:32.938000 audit[3072]: AVC avc: denied { perfmon } for pid=3072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:32.938000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:32.938000 audit[3072]: AVC avc: denied { bpf } for pid=3072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:32.938000 audit: BPF prog-id=114 op=LOAD May 17 00:52:32.938000 audit[3072]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2681 pid=3072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:32.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965383565343730353336353566333039323261383037316131376335 May 17 00:52:33.299491 kubelet[1912]: I0517 00:52:33.299346 1912 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-92l2r" podStartSLOduration=39.999526149 podStartE2EDuration="44.299330407s" podCreationTimestamp="2025-05-17 00:51:49 +0000 UTC" firstStartedPulling="2025-05-17 00:52:28.509700255 +0000 UTC m=+41.188552651" lastFinishedPulling="2025-05-17 00:52:32.809504473 +0000 UTC m=+45.488356909" observedRunningTime="2025-05-17 00:52:33.299244083 +0000 UTC m=+45.978096519" watchObservedRunningTime="2025-05-17 00:52:33.299330407 +0000 UTC m=+45.978182843" May 17 00:52:34.010940 kubelet[1912]: E0517 00:52:34.010888 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:34.080948 kubelet[1912]: I0517 00:52:34.080889 1912 csi_plugin.go:106] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 17 00:52:34.080948 kubelet[1912]: I0517 00:52:34.080920 1912 csi_plugin.go:119] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 17 00:52:35.011186 kubelet[1912]: E0517 00:52:35.011148 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:35.143225 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2695771458.mount: Deactivated successfully. May 17 00:52:36.011909 kubelet[1912]: E0517 00:52:36.011863 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:36.563254 env[1446]: time="2025-05-17T00:52:36.563203890Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:52:36.574882 env[1446]: time="2025-05-17T00:52:36.574826546Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e8b1cb61bd96acc3ff3c695318c9cc691213d532eee3731d038af92816fcb5f4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:52:36.580873 env[1446]: time="2025-05-17T00:52:36.580834704Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:52:36.586018 env[1446]: time="2025-05-17T00:52:36.585943619Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:52:36.586802 env[1446]: time="2025-05-17T00:52:36.586766017Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:e8b1cb61bd96acc3ff3c695318c9cc691213d532eee3731d038af92816fcb5f4\"" May 17 00:52:36.595978 env[1446]: time="2025-05-17T00:52:36.595930560Z" level=info msg="CreateContainer within sandbox \"dff7e0ce630fd5817173a2404e820ba41c20547eaea2ec611127807e81e23f70\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" May 17 00:52:36.623194 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2889100861.mount: Deactivated successfully. May 17 00:52:36.629438 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2507454310.mount: Deactivated successfully. May 17 00:52:36.648198 env[1446]: time="2025-05-17T00:52:36.648145250Z" level=info msg="CreateContainer within sandbox \"dff7e0ce630fd5817173a2404e820ba41c20547eaea2ec611127807e81e23f70\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"91b01f3146a55f1117022348de1edee7ce942510df5090fd916fab0f591dc81f\"" May 17 00:52:36.649244 env[1446]: time="2025-05-17T00:52:36.649207059Z" level=info msg="StartContainer for \"91b01f3146a55f1117022348de1edee7ce942510df5090fd916fab0f591dc81f\"" May 17 00:52:36.668486 systemd[1]: Started cri-containerd-91b01f3146a55f1117022348de1edee7ce942510df5090fd916fab0f591dc81f.scope. May 17 00:52:36.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:36.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:36.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:36.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:36.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:36.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:36.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:36.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:36.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:36.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:36.679000 audit: BPF prog-id=115 op=LOAD May 17 00:52:36.680000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:36.680000 audit[3120]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3023 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:36.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931623031663331343661353566313131373032323334386465316564 May 17 00:52:36.681000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:36.681000 audit[3120]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3023 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:36.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931623031663331343661353566313131373032323334386465316564 May 17 00:52:36.681000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:36.681000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:36.681000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:36.681000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:36.681000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:36.681000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:36.681000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:36.681000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:36.681000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:36.681000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:36.681000 audit: BPF prog-id=116 op=LOAD May 17 00:52:36.681000 audit[3120]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3023 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:36.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931623031663331343661353566313131373032323334386465316564 May 17 00:52:36.681000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:36.681000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:36.681000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:36.681000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:36.681000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:36.681000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:36.681000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:36.681000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:36.681000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:36.681000 audit: BPF prog-id=117 op=LOAD May 17 00:52:36.681000 audit[3120]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3023 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:36.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931623031663331343661353566313131373032323334386465316564 May 17 00:52:36.682000 audit: BPF prog-id=117 op=UNLOAD May 17 00:52:36.682000 audit: BPF prog-id=116 op=UNLOAD May 17 00:52:36.682000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:36.682000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:36.682000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:36.682000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:36.682000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:36.682000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:36.682000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:36.682000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:36.682000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:36.682000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:36.682000 audit: BPF prog-id=118 op=LOAD May 17 00:52:36.682000 audit[3120]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3023 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:36.682000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931623031663331343661353566313131373032323334386465316564 May 17 00:52:36.700737 env[1446]: time="2025-05-17T00:52:36.700692955Z" level=info msg="StartContainer for \"91b01f3146a55f1117022348de1edee7ce942510df5090fd916fab0f591dc81f\" returns successfully" May 17 00:52:37.012713 kubelet[1912]: E0517 00:52:37.012657 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:38.013091 kubelet[1912]: E0517 00:52:38.013039 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:39.014113 kubelet[1912]: E0517 00:52:39.014073 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:40.015328 kubelet[1912]: E0517 00:52:40.015285 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:41.015761 kubelet[1912]: E0517 00:52:41.015706 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:42.016265 kubelet[1912]: E0517 00:52:42.016222 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:42.604000 audit[3177]: NETFILTER_CFG table=filter:75 family=2 entries=24 op=nft_register_rule pid=3177 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:52:42.611599 kernel: kauditd_printk_skb: 90 callbacks suppressed May 17 00:52:42.611661 kernel: audit: type=1325 audit(1747443162.604:720): table=filter:75 family=2 entries=24 op=nft_register_rule pid=3177 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:52:42.604000 audit[3177]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13432 a0=3 a1=ffffd2cea990 a2=0 a3=1 items=0 ppid=2230 pid=3177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:42.655953 kernel: audit: type=1300 audit(1747443162.604:720): arch=c00000b7 syscall=211 success=yes exit=13432 a0=3 a1=ffffd2cea990 a2=0 a3=1 items=0 ppid=2230 pid=3177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:42.604000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:52:42.672615 kernel: audit: type=1327 audit(1747443162.604:720): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:52:42.625000 audit[3177]: NETFILTER_CFG table=nat:76 family=2 entries=22 op=nft_register_rule pid=3177 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:52:42.673885 kubelet[1912]: I0517 00:52:42.673144 1912 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-7fcdb87857-7fdlz" podStartSLOduration=21.567048294 podStartE2EDuration="27.673125742s" podCreationTimestamp="2025-05-17 00:52:15 +0000 UTC" firstStartedPulling="2025-05-17 00:52:30.482162557 +0000 UTC m=+43.161014993" lastFinishedPulling="2025-05-17 00:52:36.588240045 +0000 UTC m=+49.267092441" observedRunningTime="2025-05-17 00:52:37.309877511 +0000 UTC m=+49.988729947" watchObservedRunningTime="2025-05-17 00:52:42.673125742 +0000 UTC m=+55.351978178" May 17 00:52:42.688311 kernel: audit: type=1325 audit(1747443162.625:721): table=nat:76 family=2 entries=22 op=nft_register_rule pid=3177 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:52:42.625000 audit[3177]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffd2cea990 a2=0 a3=1 items=0 ppid=2230 pid=3177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:42.715892 kernel: audit: type=1300 audit(1747443162.625:721): arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffd2cea990 a2=0 a3=1 items=0 ppid=2230 pid=3177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:42.625000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:52:42.730518 kernel: audit: type=1327 audit(1747443162.625:721): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:52:42.739000 audit[3179]: NETFILTER_CFG table=filter:77 family=2 entries=36 op=nft_register_rule pid=3179 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:52:42.743720 systemd[1]: Created slice kubepods-besteffort-pode56ebc8b_12b2_46df_879d_78df53eee483.slice. May 17 00:52:42.739000 audit[3179]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13432 a0=3 a1=ffffe7b35390 a2=0 a3=1 items=0 ppid=2230 pid=3179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:42.786214 kernel: audit: type=1325 audit(1747443162.739:722): table=filter:77 family=2 entries=36 op=nft_register_rule pid=3179 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:52:42.786362 kernel: audit: type=1300 audit(1747443162.739:722): arch=c00000b7 syscall=211 success=yes exit=13432 a0=3 a1=ffffe7b35390 a2=0 a3=1 items=0 ppid=2230 pid=3179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:42.739000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:52:42.802534 kernel: audit: type=1327 audit(1747443162.739:722): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:52:42.787000 audit[3179]: NETFILTER_CFG table=nat:78 family=2 entries=22 op=nft_register_rule pid=3179 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:52:42.818100 kernel: audit: type=1325 audit(1747443162.787:723): table=nat:78 family=2 entries=22 op=nft_register_rule pid=3179 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:52:42.818469 kubelet[1912]: I0517 00:52:42.818391 1912 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6dvcm\" (UniqueName: \"kubernetes.io/projected/e56ebc8b-12b2-46df-879d-78df53eee483-kube-api-access-6dvcm\") pod \"nfs-server-provisioner-0\" (UID: \"e56ebc8b-12b2-46df-879d-78df53eee483\") " pod="default/nfs-server-provisioner-0" May 17 00:52:42.818469 kubelet[1912]: I0517 00:52:42.818445 1912 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/e56ebc8b-12b2-46df-879d-78df53eee483-data\") pod \"nfs-server-provisioner-0\" (UID: \"e56ebc8b-12b2-46df-879d-78df53eee483\") " pod="default/nfs-server-provisioner-0" May 17 00:52:42.787000 audit[3179]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffe7b35390 a2=0 a3=1 items=0 ppid=2230 pid=3179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:42.787000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:52:43.017025 kubelet[1912]: E0517 00:52:43.016966 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:43.088253 env[1446]: time="2025-05-17T00:52:43.088197476Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:e56ebc8b-12b2-46df-879d-78df53eee483,Namespace:default,Attempt:0,}" May 17 00:52:43.252877 systemd-networkd[1608]: cali60e51b789ff: Link UP May 17 00:52:43.272681 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:52:43.272817 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready May 17 00:52:43.273701 systemd-networkd[1608]: cali60e51b789ff: Gained carrier May 17 00:52:43.296425 env[1446]: 2025-05-17 00:52:43.170 [INFO][3182] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.32-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default e56ebc8b-12b2-46df-879d-78df53eee483 1675 0 2025-05-17 00:52:42 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.200.20.32 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="616543fafcaa5ea7b8aeb5f5d1835cf6082c27d774482f4b03325c23af2dfd30" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.32-k8s-nfs--server--provisioner--0-" May 17 00:52:43.296425 env[1446]: 2025-05-17 00:52:43.170 [INFO][3182] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="616543fafcaa5ea7b8aeb5f5d1835cf6082c27d774482f4b03325c23af2dfd30" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.32-k8s-nfs--server--provisioner--0-eth0" May 17 00:52:43.296425 env[1446]: 2025-05-17 00:52:43.196 [INFO][3194] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="616543fafcaa5ea7b8aeb5f5d1835cf6082c27d774482f4b03325c23af2dfd30" HandleID="k8s-pod-network.616543fafcaa5ea7b8aeb5f5d1835cf6082c27d774482f4b03325c23af2dfd30" Workload="10.200.20.32-k8s-nfs--server--provisioner--0-eth0" May 17 00:52:43.296425 env[1446]: 2025-05-17 00:52:43.196 [INFO][3194] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="616543fafcaa5ea7b8aeb5f5d1835cf6082c27d774482f4b03325c23af2dfd30" HandleID="k8s-pod-network.616543fafcaa5ea7b8aeb5f5d1835cf6082c27d774482f4b03325c23af2dfd30" Workload="10.200.20.32-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002d7020), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.32", "pod":"nfs-server-provisioner-0", "timestamp":"2025-05-17 00:52:43.195982259 +0000 UTC"}, Hostname:"10.200.20.32", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:52:43.296425 env[1446]: 2025-05-17 00:52:43.196 [INFO][3194] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:52:43.296425 env[1446]: 2025-05-17 00:52:43.196 [INFO][3194] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:52:43.296425 env[1446]: 2025-05-17 00:52:43.196 [INFO][3194] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.32' May 17 00:52:43.296425 env[1446]: 2025-05-17 00:52:43.215 [INFO][3194] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.616543fafcaa5ea7b8aeb5f5d1835cf6082c27d774482f4b03325c23af2dfd30" host="10.200.20.32" May 17 00:52:43.296425 env[1446]: 2025-05-17 00:52:43.220 [INFO][3194] ipam/ipam.go 394: Looking up existing affinities for host host="10.200.20.32" May 17 00:52:43.296425 env[1446]: 2025-05-17 00:52:43.225 [INFO][3194] ipam/ipam.go 511: Trying affinity for 192.168.31.128/26 host="10.200.20.32" May 17 00:52:43.296425 env[1446]: 2025-05-17 00:52:43.227 [INFO][3194] ipam/ipam.go 158: Attempting to load block cidr=192.168.31.128/26 host="10.200.20.32" May 17 00:52:43.296425 env[1446]: 2025-05-17 00:52:43.228 [INFO][3194] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.31.128/26 host="10.200.20.32" May 17 00:52:43.296425 env[1446]: 2025-05-17 00:52:43.229 [INFO][3194] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.31.128/26 handle="k8s-pod-network.616543fafcaa5ea7b8aeb5f5d1835cf6082c27d774482f4b03325c23af2dfd30" host="10.200.20.32" May 17 00:52:43.296425 env[1446]: 2025-05-17 00:52:43.230 [INFO][3194] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.616543fafcaa5ea7b8aeb5f5d1835cf6082c27d774482f4b03325c23af2dfd30 May 17 00:52:43.296425 env[1446]: 2025-05-17 00:52:43.237 [INFO][3194] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.31.128/26 handle="k8s-pod-network.616543fafcaa5ea7b8aeb5f5d1835cf6082c27d774482f4b03325c23af2dfd30" host="10.200.20.32" May 17 00:52:43.296425 env[1446]: 2025-05-17 00:52:43.245 [INFO][3194] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.31.131/26] block=192.168.31.128/26 handle="k8s-pod-network.616543fafcaa5ea7b8aeb5f5d1835cf6082c27d774482f4b03325c23af2dfd30" host="10.200.20.32" May 17 00:52:43.296425 env[1446]: 2025-05-17 00:52:43.246 [INFO][3194] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.31.131/26] handle="k8s-pod-network.616543fafcaa5ea7b8aeb5f5d1835cf6082c27d774482f4b03325c23af2dfd30" host="10.200.20.32" May 17 00:52:43.296425 env[1446]: 2025-05-17 00:52:43.246 [INFO][3194] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:52:43.296425 env[1446]: 2025-05-17 00:52:43.246 [INFO][3194] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.31.131/26] IPv6=[] ContainerID="616543fafcaa5ea7b8aeb5f5d1835cf6082c27d774482f4b03325c23af2dfd30" HandleID="k8s-pod-network.616543fafcaa5ea7b8aeb5f5d1835cf6082c27d774482f4b03325c23af2dfd30" Workload="10.200.20.32-k8s-nfs--server--provisioner--0-eth0" May 17 00:52:43.297030 env[1446]: 2025-05-17 00:52:43.247 [INFO][3182] cni-plugin/k8s.go 418: Populated endpoint ContainerID="616543fafcaa5ea7b8aeb5f5d1835cf6082c27d774482f4b03325c23af2dfd30" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.32-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.32-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"e56ebc8b-12b2-46df-879d-78df53eee483", ResourceVersion:"1675", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 52, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.32", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.31.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:52:43.297030 env[1446]: 2025-05-17 00:52:43.248 [INFO][3182] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.31.131/32] ContainerID="616543fafcaa5ea7b8aeb5f5d1835cf6082c27d774482f4b03325c23af2dfd30" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.32-k8s-nfs--server--provisioner--0-eth0" May 17 00:52:43.297030 env[1446]: 2025-05-17 00:52:43.248 [INFO][3182] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="616543fafcaa5ea7b8aeb5f5d1835cf6082c27d774482f4b03325c23af2dfd30" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.32-k8s-nfs--server--provisioner--0-eth0" May 17 00:52:43.297030 env[1446]: 2025-05-17 00:52:43.273 [INFO][3182] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="616543fafcaa5ea7b8aeb5f5d1835cf6082c27d774482f4b03325c23af2dfd30" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.32-k8s-nfs--server--provisioner--0-eth0" May 17 00:52:43.297189 env[1446]: 2025-05-17 00:52:43.274 [INFO][3182] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="616543fafcaa5ea7b8aeb5f5d1835cf6082c27d774482f4b03325c23af2dfd30" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.32-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.32-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"e56ebc8b-12b2-46df-879d-78df53eee483", ResourceVersion:"1675", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 52, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.32", ContainerID:"616543fafcaa5ea7b8aeb5f5d1835cf6082c27d774482f4b03325c23af2dfd30", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.31.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"0e:b8:8f:95:77:be", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:52:43.297189 env[1446]: 2025-05-17 00:52:43.293 [INFO][3182] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="616543fafcaa5ea7b8aeb5f5d1835cf6082c27d774482f4b03325c23af2dfd30" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.32-k8s-nfs--server--provisioner--0-eth0" May 17 00:52:43.305000 audit[3210]: NETFILTER_CFG table=filter:79 family=2 entries=40 op=nft_register_chain pid=3210 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:52:43.305000 audit[3210]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20756 a0=3 a1=fffff284a820 a2=0 a3=ffffa7e3bfa8 items=0 ppid=2771 pid=3210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:43.305000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:52:43.313305 env[1446]: time="2025-05-17T00:52:43.313212735Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:52:43.313444 env[1446]: time="2025-05-17T00:52:43.313315819Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:52:43.313444 env[1446]: time="2025-05-17T00:52:43.313344580Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:52:43.314405 env[1446]: time="2025-05-17T00:52:43.313581229Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/616543fafcaa5ea7b8aeb5f5d1835cf6082c27d774482f4b03325c23af2dfd30 pid=3219 runtime=io.containerd.runc.v2 May 17 00:52:43.334883 systemd[1]: Started cri-containerd-616543fafcaa5ea7b8aeb5f5d1835cf6082c27d774482f4b03325c23af2dfd30.scope. May 17 00:52:43.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:43.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:43.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:43.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:43.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:43.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:43.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:43.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:43.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:43.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:43.346000 audit: BPF prog-id=119 op=LOAD May 17 00:52:43.347000 audit[3228]: AVC avc: denied { bpf } for pid=3228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:43.347000 audit[3228]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3219 pid=3228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:43.347000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631363534336661666361613565613762386165623566356431383335 May 17 00:52:43.348000 audit[3228]: AVC avc: denied { perfmon } for pid=3228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:43.348000 audit[3228]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3219 pid=3228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:43.348000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631363534336661666361613565613762386165623566356431383335 May 17 00:52:43.348000 audit[3228]: AVC avc: denied { bpf } for pid=3228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:43.348000 audit[3228]: AVC avc: denied { bpf } for pid=3228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:43.348000 audit[3228]: AVC avc: denied { bpf } for pid=3228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:43.348000 audit[3228]: AVC avc: denied { perfmon } for pid=3228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:43.348000 audit[3228]: AVC avc: denied { perfmon } for pid=3228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:43.348000 audit[3228]: AVC avc: denied { perfmon } for pid=3228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:43.348000 audit[3228]: AVC avc: denied { perfmon } for pid=3228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:43.348000 audit[3228]: AVC avc: denied { perfmon } for pid=3228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:43.348000 audit[3228]: AVC avc: denied { bpf } for pid=3228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:43.348000 audit[3228]: AVC avc: denied { bpf } for pid=3228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:43.348000 audit: BPF prog-id=120 op=LOAD May 17 00:52:43.348000 audit[3228]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3219 pid=3228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:43.348000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631363534336661666361613565613762386165623566356431383335 May 17 00:52:43.349000 audit[3228]: AVC avc: denied { bpf } for pid=3228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:43.349000 audit[3228]: AVC avc: denied { bpf } for pid=3228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:43.349000 audit[3228]: AVC avc: denied { perfmon } for pid=3228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:43.349000 audit[3228]: AVC avc: denied { perfmon } for pid=3228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:43.349000 audit[3228]: AVC avc: denied { perfmon } for pid=3228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:43.349000 audit[3228]: AVC avc: denied { perfmon } for pid=3228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:43.349000 audit[3228]: AVC avc: denied { perfmon } for pid=3228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:43.349000 audit[3228]: AVC avc: denied { bpf } for pid=3228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:43.349000 audit[3228]: AVC avc: denied { bpf } for pid=3228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:43.349000 audit: BPF prog-id=121 op=LOAD May 17 00:52:43.349000 audit[3228]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3219 pid=3228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:43.349000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631363534336661666361613565613762386165623566356431383335 May 17 00:52:43.349000 audit: BPF prog-id=121 op=UNLOAD May 17 00:52:43.349000 audit: BPF prog-id=120 op=UNLOAD May 17 00:52:43.349000 audit[3228]: AVC avc: denied { bpf } for pid=3228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:43.349000 audit[3228]: AVC avc: denied { bpf } for pid=3228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:43.349000 audit[3228]: AVC avc: denied { bpf } for pid=3228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:43.349000 audit[3228]: AVC avc: denied { perfmon } for pid=3228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:43.349000 audit[3228]: AVC avc: denied { perfmon } for pid=3228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:43.349000 audit[3228]: AVC avc: denied { perfmon } for pid=3228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:43.349000 audit[3228]: AVC avc: denied { perfmon } for pid=3228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:43.349000 audit[3228]: AVC avc: denied { perfmon } for pid=3228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:43.349000 audit[3228]: AVC avc: denied { bpf } for pid=3228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:43.349000 audit[3228]: AVC avc: denied { bpf } for pid=3228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:43.349000 audit: BPF prog-id=122 op=LOAD May 17 00:52:43.349000 audit[3228]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3219 pid=3228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:43.349000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631363534336661666361613565613762386165623566356431383335 May 17 00:52:43.371481 env[1446]: time="2025-05-17T00:52:43.371429037Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:e56ebc8b-12b2-46df-879d-78df53eee483,Namespace:default,Attempt:0,} returns sandbox id \"616543fafcaa5ea7b8aeb5f5d1835cf6082c27d774482f4b03325c23af2dfd30\"" May 17 00:52:43.373412 env[1446]: time="2025-05-17T00:52:43.373217987Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" May 17 00:52:43.933990 systemd[1]: run-containerd-runc-k8s.io-616543fafcaa5ea7b8aeb5f5d1835cf6082c27d774482f4b03325c23af2dfd30-runc.hx0Jkc.mount: Deactivated successfully. May 17 00:52:44.018118 kubelet[1912]: E0517 00:52:44.018068 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:44.615181 systemd-networkd[1608]: cali60e51b789ff: Gained IPv6LL May 17 00:52:45.018756 kubelet[1912]: E0517 00:52:45.018714 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:46.019110 kubelet[1912]: E0517 00:52:46.019070 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:46.186135 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3755852427.mount: Deactivated successfully. May 17 00:52:47.019952 kubelet[1912]: E0517 00:52:47.019901 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:48.022268 kubelet[1912]: E0517 00:52:48.022214 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:48.372596 env[1446]: time="2025-05-17T00:52:48.372240707Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:52:48.385218 env[1446]: time="2025-05-17T00:52:48.385169328Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:52:48.391356 env[1446]: time="2025-05-17T00:52:48.391302427Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:52:48.448083 env[1446]: time="2025-05-17T00:52:48.447637275Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:52:48.448944 env[1446]: time="2025-05-17T00:52:48.448906880Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685\"" May 17 00:52:48.456417 env[1446]: time="2025-05-17T00:52:48.456370466Z" level=info msg="CreateContainer within sandbox \"616543fafcaa5ea7b8aeb5f5d1835cf6082c27d774482f4b03325c23af2dfd30\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" May 17 00:52:48.487588 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1407078707.mount: Deactivated successfully. May 17 00:52:48.493918 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3362831690.mount: Deactivated successfully. May 17 00:52:48.523070 env[1446]: time="2025-05-17T00:52:48.522975241Z" level=info msg="CreateContainer within sandbox \"616543fafcaa5ea7b8aeb5f5d1835cf6082c27d774482f4b03325c23af2dfd30\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"fdfe40b33aec35c0279f2be0c30a3785cc12e855233890ee67b31a595617d976\"" May 17 00:52:48.524203 env[1446]: time="2025-05-17T00:52:48.524162323Z" level=info msg="StartContainer for \"fdfe40b33aec35c0279f2be0c30a3785cc12e855233890ee67b31a595617d976\"" May 17 00:52:48.545744 systemd[1]: Started cri-containerd-fdfe40b33aec35c0279f2be0c30a3785cc12e855233890ee67b31a595617d976.scope. May 17 00:52:48.584709 kernel: kauditd_printk_skb: 62 callbacks suppressed May 17 00:52:48.584885 kernel: audit: type=1400 audit(1747443168.559:743): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:48.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:48.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:48.604190 kernel: audit: type=1400 audit(1747443168.559:744): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:48.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:48.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:48.644482 kernel: audit: type=1400 audit(1747443168.559:745): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:48.644630 kernel: audit: type=1400 audit(1747443168.559:746): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:48.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:48.664452 kernel: audit: type=1400 audit(1747443168.559:747): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:48.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:48.683888 kernel: audit: type=1400 audit(1747443168.559:748): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:48.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:48.703524 kernel: audit: type=1400 audit(1747443168.559:749): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:48.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:48.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:48.743980 kernel: audit: type=1400 audit(1747443168.559:750): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:48.744103 kernel: audit: type=1400 audit(1747443168.559:751): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:48.744174 env[1446]: time="2025-05-17T00:52:48.725497980Z" level=info msg="StartContainer for \"fdfe40b33aec35c0279f2be0c30a3785cc12e855233890ee67b31a595617d976\" returns successfully" May 17 00:52:48.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:48.762572 kernel: audit: type=1400 audit(1747443168.559:752): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:48.559000 audit: BPF prog-id=123 op=LOAD May 17 00:52:48.565000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:48.565000 audit[3262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=3219 pid=3262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:48.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664666534306233336165633335633032373966326265306333306133 May 17 00:52:48.565000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:48.565000 audit[3262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3219 pid=3262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:48.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664666534306233336165633335633032373966326265306333306133 May 17 00:52:48.565000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:48.565000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:48.565000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:48.565000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:48.565000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:48.565000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:48.565000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:48.565000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:48.565000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:48.565000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:48.565000 audit: BPF prog-id=124 op=LOAD May 17 00:52:48.565000 audit[3262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3219 pid=3262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:48.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664666534306233336165633335633032373966326265306333306133 May 17 00:52:48.584000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:48.584000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:48.584000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:48.584000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:48.584000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:48.584000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:48.584000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:48.584000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:48.584000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:48.584000 audit: BPF prog-id=125 op=LOAD May 17 00:52:48.584000 audit[3262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3219 pid=3262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:48.584000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664666534306233336165633335633032373966326265306333306133 May 17 00:52:48.584000 audit: BPF prog-id=125 op=UNLOAD May 17 00:52:48.584000 audit: BPF prog-id=124 op=UNLOAD May 17 00:52:48.584000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:48.584000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:48.584000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:48.584000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:48.584000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:48.584000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:48.584000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:48.584000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:48.584000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:48.584000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:52:48.584000 audit: BPF prog-id=126 op=LOAD May 17 00:52:48.584000 audit[3262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3219 pid=3262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:48.584000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664666534306233336165633335633032373966326265306333306133 May 17 00:52:48.743000 audit[3293]: AVC avc: denied { search } for pid=3293 comm="rpcbind" name="crypto" dev="proc" ino=21701 scontext=system_u:system_r:svirt_lxc_net_t:s0:c290,c411 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 17 00:52:48.743000 audit[3293]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff851cf000 a2=0 a3=0 items=0 ppid=3273 pid=3293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c290,c411 key=(null) May 17 00:52:48.743000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 May 17 00:52:48.791000 audit[3298]: AVC avc: denied { search } for pid=3298 comm="dbus-daemon" name="crypto" dev="proc" ino=21701 scontext=system_u:system_r:svirt_lxc_net_t:s0:c290,c411 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 17 00:52:48.791000 audit[3298]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff8343f000 a2=0 a3=0 items=0 ppid=3273 pid=3298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c290,c411 key=(null) May 17 00:52:48.791000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 17 00:52:48.794000 audit[3299]: AVC avc: denied { watch } for pid=3299 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537501 scontext=system_u:system_r:svirt_lxc_net_t:s0:c290,c411 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c290,c411 tclass=dir permissive=0 May 17 00:52:48.794000 audit[3299]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=aaab026b5a40 a2=2c8 a3=aaab026b0a60 items=0 ppid=3273 pid=3299 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c290,c411 key=(null) May 17 00:52:48.794000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 17 00:52:48.798000 audit[3300]: AVC avc: denied { read } for pid=3300 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=21734 scontext=system_u:system_r:svirt_lxc_net_t:s0:c290,c411 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 May 17 00:52:48.798000 audit[3300]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffff9c a1=ffff83a3a570 a2=80000 a3=0 items=0 ppid=3273 pid=3300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c290,c411 key=(null) May 17 00:52:48.798000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 17 00:52:48.799000 audit[3300]: AVC avc: denied { search } for pid=3300 comm="ganesha.nfsd" name="crypto" dev="proc" ino=21701 scontext=system_u:system_r:svirt_lxc_net_t:s0:c290,c411 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 17 00:52:48.799000 audit[3300]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff82dcf000 a2=0 a3=0 items=0 ppid=3273 pid=3300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c290,c411 key=(null) May 17 00:52:48.799000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 17 00:52:48.975839 kubelet[1912]: E0517 00:52:48.975793 1912 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:48.994094 env[1446]: time="2025-05-17T00:52:48.994049634Z" level=info msg="StopPodSandbox for \"8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0\"" May 17 00:52:49.022972 kubelet[1912]: E0517 00:52:49.022923 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:49.066678 env[1446]: 2025-05-17 00:52:49.030 [WARNING][3314] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.32-k8s-csi--node--driver--92l2r-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1f904db8-53aa-4690-87de-f3596ea62196", ResourceVersion:"1621", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 51, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.32", ContainerID:"c09ef24b0811669050bcde95097d553f69c045c4a2c00b2f9f83be0085a26022", Pod:"csi-node-driver-92l2r", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.31.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali02fa670cda3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:52:49.066678 env[1446]: 2025-05-17 00:52:49.030 [INFO][3314] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0" May 17 00:52:49.066678 env[1446]: 2025-05-17 00:52:49.031 [INFO][3314] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0" iface="eth0" netns="" May 17 00:52:49.066678 env[1446]: 2025-05-17 00:52:49.031 [INFO][3314] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0" May 17 00:52:49.066678 env[1446]: 2025-05-17 00:52:49.031 [INFO][3314] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0" May 17 00:52:49.066678 env[1446]: 2025-05-17 00:52:49.051 [INFO][3321] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0" HandleID="k8s-pod-network.8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0" Workload="10.200.20.32-k8s-csi--node--driver--92l2r-eth0" May 17 00:52:49.066678 env[1446]: 2025-05-17 00:52:49.051 [INFO][3321] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:52:49.066678 env[1446]: 2025-05-17 00:52:49.051 [INFO][3321] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:52:49.066678 env[1446]: 2025-05-17 00:52:49.062 [WARNING][3321] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0" HandleID="k8s-pod-network.8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0" Workload="10.200.20.32-k8s-csi--node--driver--92l2r-eth0" May 17 00:52:49.066678 env[1446]: 2025-05-17 00:52:49.062 [INFO][3321] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0" HandleID="k8s-pod-network.8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0" Workload="10.200.20.32-k8s-csi--node--driver--92l2r-eth0" May 17 00:52:49.066678 env[1446]: 2025-05-17 00:52:49.064 [INFO][3321] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:52:49.066678 env[1446]: 2025-05-17 00:52:49.065 [INFO][3314] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0" May 17 00:52:49.067180 env[1446]: time="2025-05-17T00:52:49.066689777Z" level=info msg="TearDown network for sandbox \"8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0\" successfully" May 17 00:52:49.067180 env[1446]: time="2025-05-17T00:52:49.066722098Z" level=info msg="StopPodSandbox for \"8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0\" returns successfully" May 17 00:52:49.067414 env[1446]: time="2025-05-17T00:52:49.067383001Z" level=info msg="RemovePodSandbox for \"8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0\"" May 17 00:52:49.067462 env[1446]: time="2025-05-17T00:52:49.067422482Z" level=info msg="Forcibly stopping sandbox \"8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0\"" May 17 00:52:49.153153 env[1446]: 2025-05-17 00:52:49.109 [WARNING][3335] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.32-k8s-csi--node--driver--92l2r-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1f904db8-53aa-4690-87de-f3596ea62196", ResourceVersion:"1621", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 51, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.32", ContainerID:"c09ef24b0811669050bcde95097d553f69c045c4a2c00b2f9f83be0085a26022", Pod:"csi-node-driver-92l2r", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.31.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali02fa670cda3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:52:49.153153 env[1446]: 2025-05-17 00:52:49.111 [INFO][3335] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0" May 17 00:52:49.153153 env[1446]: 2025-05-17 00:52:49.111 [INFO][3335] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0" iface="eth0" netns="" May 17 00:52:49.153153 env[1446]: 2025-05-17 00:52:49.111 [INFO][3335] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0" May 17 00:52:49.153153 env[1446]: 2025-05-17 00:52:49.111 [INFO][3335] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0" May 17 00:52:49.153153 env[1446]: 2025-05-17 00:52:49.139 [INFO][3345] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0" HandleID="k8s-pod-network.8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0" Workload="10.200.20.32-k8s-csi--node--driver--92l2r-eth0" May 17 00:52:49.153153 env[1446]: 2025-05-17 00:52:49.139 [INFO][3345] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:52:49.153153 env[1446]: 2025-05-17 00:52:49.139 [INFO][3345] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:52:49.153153 env[1446]: 2025-05-17 00:52:49.148 [WARNING][3345] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0" HandleID="k8s-pod-network.8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0" Workload="10.200.20.32-k8s-csi--node--driver--92l2r-eth0" May 17 00:52:49.153153 env[1446]: 2025-05-17 00:52:49.148 [INFO][3345] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0" HandleID="k8s-pod-network.8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0" Workload="10.200.20.32-k8s-csi--node--driver--92l2r-eth0" May 17 00:52:49.153153 env[1446]: 2025-05-17 00:52:49.150 [INFO][3345] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:52:49.153153 env[1446]: 2025-05-17 00:52:49.151 [INFO][3335] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0" May 17 00:52:49.153716 env[1446]: time="2025-05-17T00:52:49.153187759Z" level=info msg="TearDown network for sandbox \"8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0\" successfully" May 17 00:52:49.164388 env[1446]: time="2025-05-17T00:52:49.164328188Z" level=info msg="RemovePodSandbox \"8c404076883ad9f8e23f54f9751130bfbfa6d2a1ec43d280842eabed98d20ab0\" returns successfully" May 17 00:52:49.165095 env[1446]: time="2025-05-17T00:52:49.165059614Z" level=info msg="StopPodSandbox for \"1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b\"" May 17 00:52:49.241045 env[1446]: 2025-05-17 00:52:49.201 [WARNING][3360] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.32-k8s-nginx--deployment--7fcdb87857--7fdlz-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"31021edc-d961-4749-968e-cec33d34c54e", ResourceVersion:"1635", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 52, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.32", ContainerID:"dff7e0ce630fd5817173a2404e820ba41c20547eaea2ec611127807e81e23f70", Pod:"nginx-deployment-7fcdb87857-7fdlz", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.31.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calif777c49b887", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:52:49.241045 env[1446]: 2025-05-17 00:52:49.202 [INFO][3360] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b" May 17 00:52:49.241045 env[1446]: 2025-05-17 00:52:49.202 [INFO][3360] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b" iface="eth0" netns="" May 17 00:52:49.241045 env[1446]: 2025-05-17 00:52:49.202 [INFO][3360] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b" May 17 00:52:49.241045 env[1446]: 2025-05-17 00:52:49.202 [INFO][3360] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b" May 17 00:52:49.241045 env[1446]: 2025-05-17 00:52:49.225 [INFO][3367] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b" HandleID="k8s-pod-network.1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b" Workload="10.200.20.32-k8s-nginx--deployment--7fcdb87857--7fdlz-eth0" May 17 00:52:49.241045 env[1446]: 2025-05-17 00:52:49.225 [INFO][3367] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:52:49.241045 env[1446]: 2025-05-17 00:52:49.226 [INFO][3367] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:52:49.241045 env[1446]: 2025-05-17 00:52:49.235 [WARNING][3367] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b" HandleID="k8s-pod-network.1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b" Workload="10.200.20.32-k8s-nginx--deployment--7fcdb87857--7fdlz-eth0" May 17 00:52:49.241045 env[1446]: 2025-05-17 00:52:49.235 [INFO][3367] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b" HandleID="k8s-pod-network.1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b" Workload="10.200.20.32-k8s-nginx--deployment--7fcdb87857--7fdlz-eth0" May 17 00:52:49.241045 env[1446]: 2025-05-17 00:52:49.236 [INFO][3367] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:52:49.241045 env[1446]: 2025-05-17 00:52:49.238 [INFO][3360] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b" May 17 00:52:49.241045 env[1446]: time="2025-05-17T00:52:49.239604939Z" level=info msg="TearDown network for sandbox \"1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b\" successfully" May 17 00:52:49.241045 env[1446]: time="2025-05-17T00:52:49.239676581Z" level=info msg="StopPodSandbox for \"1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b\" returns successfully" May 17 00:52:49.242061 env[1446]: time="2025-05-17T00:52:49.241962661Z" level=info msg="RemovePodSandbox for \"1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b\"" May 17 00:52:49.242145 env[1446]: time="2025-05-17T00:52:49.242057824Z" level=info msg="Forcibly stopping sandbox \"1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b\"" May 17 00:52:49.331306 env[1446]: 2025-05-17 00:52:49.285 [WARNING][3381] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.32-k8s-nginx--deployment--7fcdb87857--7fdlz-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"31021edc-d961-4749-968e-cec33d34c54e", ResourceVersion:"1635", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 52, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.32", ContainerID:"dff7e0ce630fd5817173a2404e820ba41c20547eaea2ec611127807e81e23f70", Pod:"nginx-deployment-7fcdb87857-7fdlz", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.31.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calif777c49b887", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:52:49.331306 env[1446]: 2025-05-17 00:52:49.285 [INFO][3381] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b" May 17 00:52:49.331306 env[1446]: 2025-05-17 00:52:49.285 [INFO][3381] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b" iface="eth0" netns="" May 17 00:52:49.331306 env[1446]: 2025-05-17 00:52:49.285 [INFO][3381] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b" May 17 00:52:49.331306 env[1446]: 2025-05-17 00:52:49.286 [INFO][3381] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b" May 17 00:52:49.331306 env[1446]: 2025-05-17 00:52:49.307 [INFO][3388] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b" HandleID="k8s-pod-network.1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b" Workload="10.200.20.32-k8s-nginx--deployment--7fcdb87857--7fdlz-eth0" May 17 00:52:49.331306 env[1446]: 2025-05-17 00:52:49.308 [INFO][3388] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:52:49.331306 env[1446]: 2025-05-17 00:52:49.308 [INFO][3388] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:52:49.331306 env[1446]: 2025-05-17 00:52:49.324 [WARNING][3388] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b" HandleID="k8s-pod-network.1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b" Workload="10.200.20.32-k8s-nginx--deployment--7fcdb87857--7fdlz-eth0" May 17 00:52:49.331306 env[1446]: 2025-05-17 00:52:49.324 [INFO][3388] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b" HandleID="k8s-pod-network.1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b" Workload="10.200.20.32-k8s-nginx--deployment--7fcdb87857--7fdlz-eth0" May 17 00:52:49.331306 env[1446]: 2025-05-17 00:52:49.328 [INFO][3388] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:52:49.331306 env[1446]: 2025-05-17 00:52:49.329 [INFO][3381] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b" May 17 00:52:49.331746 env[1446]: time="2025-05-17T00:52:49.331393946Z" level=info msg="TearDown network for sandbox \"1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b\" successfully" May 17 00:52:49.339441 kubelet[1912]: I0517 00:52:49.339331 1912 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=2.261991911 podStartE2EDuration="7.339316503s" podCreationTimestamp="2025-05-17 00:52:42 +0000 UTC" firstStartedPulling="2025-05-17 00:52:43.372921696 +0000 UTC m=+56.051774092" lastFinishedPulling="2025-05-17 00:52:48.450246288 +0000 UTC m=+61.129098684" observedRunningTime="2025-05-17 00:52:49.339189058 +0000 UTC m=+62.018041494" watchObservedRunningTime="2025-05-17 00:52:49.339316503 +0000 UTC m=+62.018168939" May 17 00:52:49.344562 env[1446]: time="2025-05-17T00:52:49.344508244Z" level=info msg="RemovePodSandbox \"1d1559aa520992947b2ac5fff4454b75ece42a32c94fd62bd9348a484801ab4b\" returns successfully" May 17 00:52:49.352000 audit[3395]: NETFILTER_CFG table=filter:80 family=2 entries=24 op=nft_register_rule pid=3395 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:52:49.352000 audit[3395]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=fffffdbb8790 a2=0 a3=1 items=0 ppid=2230 pid=3395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:49.352000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:52:49.358000 audit[3395]: NETFILTER_CFG table=nat:81 family=2 entries=106 op=nft_register_chain pid=3395 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:52:49.358000 audit[3395]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=fffffdbb8790 a2=0 a3=1 items=0 ppid=2230 pid=3395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:52:49.358000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:52:50.023151 kubelet[1912]: E0517 00:52:50.023052 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:51.023432 kubelet[1912]: E0517 00:52:51.023396 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:52.024258 kubelet[1912]: E0517 00:52:52.024225 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:53.025449 kubelet[1912]: E0517 00:52:53.025374 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:54.026480 kubelet[1912]: E0517 00:52:54.026443 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:55.027847 kubelet[1912]: E0517 00:52:55.027790 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:56.029390 kubelet[1912]: E0517 00:52:56.029346 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:57.030028 kubelet[1912]: E0517 00:52:57.029979 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:58.030514 kubelet[1912]: E0517 00:52:58.030472 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:59.031820 kubelet[1912]: E0517 00:52:59.031778 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:52:59.287831 systemd[1]: run-containerd-runc-k8s.io-7b4233ed62f268ef89ea5a06e88433db7100c8a19c0f9bd16738ae6ea0b34595-runc.muWHmn.mount: Deactivated successfully. May 17 00:53:00.033248 kubelet[1912]: E0517 00:53:00.033196 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:53:01.034121 kubelet[1912]: E0517 00:53:01.034068 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:53:02.035122 kubelet[1912]: E0517 00:53:02.035079 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:53:03.036667 kubelet[1912]: E0517 00:53:03.036606 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:53:04.037226 kubelet[1912]: E0517 00:53:04.037189 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:53:05.038878 kubelet[1912]: E0517 00:53:05.038833 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:53:06.040113 kubelet[1912]: E0517 00:53:06.040069 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:53:07.041214 kubelet[1912]: E0517 00:53:07.041170 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:53:08.042094 kubelet[1912]: E0517 00:53:08.042049 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:53:08.975735 kubelet[1912]: E0517 00:53:08.975668 1912 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:53:09.006170 systemd[1]: Created slice kubepods-besteffort-pod4f504b5b_c85d_4d21_983d_69ae5ee9a038.slice. May 17 00:53:09.042491 kubelet[1912]: E0517 00:53:09.042455 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:53:09.085834 kubelet[1912]: I0517 00:53:09.085793 1912 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-40011d8b-e312-4c2c-aecf-c31c05b3882d\" (UniqueName: \"kubernetes.io/nfs/4f504b5b-c85d-4d21-983d-69ae5ee9a038-pvc-40011d8b-e312-4c2c-aecf-c31c05b3882d\") pod \"test-pod-1\" (UID: \"4f504b5b-c85d-4d21-983d-69ae5ee9a038\") " pod="default/test-pod-1" May 17 00:53:09.086118 kubelet[1912]: I0517 00:53:09.086096 1912 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-npvcp\" (UniqueName: \"kubernetes.io/projected/4f504b5b-c85d-4d21-983d-69ae5ee9a038-kube-api-access-npvcp\") pod \"test-pod-1\" (UID: \"4f504b5b-c85d-4d21-983d-69ae5ee9a038\") " pod="default/test-pod-1" May 17 00:53:09.307477 kernel: Failed to create system directory netfs May 17 00:53:09.307637 kernel: kauditd_printk_skb: 68 callbacks suppressed May 17 00:53:09.307674 kernel: audit: type=1400 audit(1747443189.294:768): avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.307707 kernel: Failed to create system directory netfs May 17 00:53:09.294000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.294000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.334729 kernel: audit: type=1400 audit(1747443189.294:768): avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.334838 kernel: Failed to create system directory netfs May 17 00:53:09.294000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.361818 kernel: audit: type=1400 audit(1747443189.294:768): avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.361933 kernel: Failed to create system directory netfs May 17 00:53:09.294000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.387922 kernel: audit: type=1400 audit(1747443189.294:768): avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.294000 audit[3447]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaae17e75e0 a1=12c14 a2=aaaad52fe028 a3=aaaae17d8010 items=0 ppid=551 pid=3447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:53:09.445142 kernel: audit: type=1300 audit(1747443189.294:768): arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaae17e75e0 a1=12c14 a2=aaaad52fe028 a3=aaaae17d8010 items=0 ppid=551 pid=3447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:53:09.445270 kernel: Failed to create system directory fscache May 17 00:53:09.445299 kernel: audit: type=1327 audit(1747443189.294:768): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 17 00:53:09.294000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 17 00:53:09.455480 kernel: Failed to create system directory fscache May 17 00:53:09.455575 kernel: audit: type=1400 audit(1747443189.405:769): avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.455608 kernel: audit: type=1400 audit(1747443189.405:769): avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.405000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.405000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.405000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.537098 kernel: audit: type=1400 audit(1747443189.405:769): avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.537200 kernel: Failed to create system directory fscache May 17 00:53:09.405000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.562645 kernel: Failed to create system directory fscache May 17 00:53:09.562781 kernel: audit: type=1400 audit(1747443189.405:769): avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.562812 kernel: Failed to create system directory fscache May 17 00:53:09.405000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.405000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.572566 kernel: Failed to create system directory fscache May 17 00:53:09.572664 kernel: Failed to create system directory fscache May 17 00:53:09.405000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.405000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.582461 kernel: Failed to create system directory fscache May 17 00:53:09.582536 kernel: Failed to create system directory fscache May 17 00:53:09.405000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.405000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.592026 kernel: Failed to create system directory fscache May 17 00:53:09.405000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.597188 kernel: Failed to create system directory fscache May 17 00:53:09.597347 kernel: Failed to create system directory fscache May 17 00:53:09.405000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.405000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.607274 kernel: Failed to create system directory fscache May 17 00:53:09.607341 kernel: Failed to create system directory fscache May 17 00:53:09.405000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.405000 audit[3447]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaae19fa210 a1=4c344 a2=aaaad52fe028 a3=aaaae17d8010 items=0 ppid=551 pid=3447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:53:09.617132 kernel: FS-Cache: Loaded May 17 00:53:09.405000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.728356 kernel: Failed to create system directory sunrpc May 17 00:53:09.728505 kernel: Failed to create system directory sunrpc May 17 00:53:09.728535 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.737987 kernel: Failed to create system directory sunrpc May 17 00:53:09.738137 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.757149 kernel: Failed to create system directory sunrpc May 17 00:53:09.757316 kernel: Failed to create system directory sunrpc May 17 00:53:09.757337 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.766193 kernel: Failed to create system directory sunrpc May 17 00:53:09.766332 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.776361 kernel: Failed to create system directory sunrpc May 17 00:53:09.776504 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.785765 kernel: Failed to create system directory sunrpc May 17 00:53:09.785909 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.794723 kernel: Failed to create system directory sunrpc May 17 00:53:09.794826 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.804443 kernel: Failed to create system directory sunrpc May 17 00:53:09.804522 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.809241 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.818582 kernel: Failed to create system directory sunrpc May 17 00:53:09.818740 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.828240 kernel: Failed to create system directory sunrpc May 17 00:53:09.828366 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.837536 kernel: Failed to create system directory sunrpc May 17 00:53:09.837647 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.846523 kernel: Failed to create system directory sunrpc May 17 00:53:09.846611 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.854237 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.859223 kernel: Failed to create system directory sunrpc May 17 00:53:09.859309 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.867581 kernel: Failed to create system directory sunrpc May 17 00:53:09.867692 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.875667 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.880298 kernel: Failed to create system directory sunrpc May 17 00:53:09.880390 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.888220 kernel: Failed to create system directory sunrpc May 17 00:53:09.888324 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.896261 kernel: Failed to create system directory sunrpc May 17 00:53:09.896397 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.900460 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.908183 kernel: Failed to create system directory sunrpc May 17 00:53:09.908279 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.916025 kernel: Failed to create system directory sunrpc May 17 00:53:09.916116 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.923931 kernel: Failed to create system directory sunrpc May 17 00:53:09.923981 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.932103 kernel: Failed to create system directory sunrpc May 17 00:53:09.932194 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.943869 kernel: Failed to create system directory sunrpc May 17 00:53:09.944034 kernel: Failed to create system directory sunrpc May 17 00:53:09.944066 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.947667 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.955145 kernel: Failed to create system directory sunrpc May 17 00:53:09.955188 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.962850 kernel: Failed to create system directory sunrpc May 17 00:53:09.962942 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.971139 kernel: Failed to create system directory sunrpc May 17 00:53:09.971223 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.979444 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.983772 kernel: Failed to create system directory sunrpc May 17 00:53:09.983866 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.987592 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.991723 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.995646 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.999568 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.007773 kernel: Failed to create system directory sunrpc May 17 00:53:10.007847 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.015699 kernel: Failed to create system directory sunrpc May 17 00:53:10.015738 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.023959 kernel: Failed to create system directory sunrpc May 17 00:53:10.024062 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.031920 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.036418 kernel: Failed to create system directory sunrpc May 17 00:53:10.036497 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.043613 kubelet[1912]: E0517 00:53:10.043554 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:53:10.044028 kernel: Failed to create system directory sunrpc May 17 00:53:10.044061 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.048258 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.052284 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.060622 kernel: Failed to create system directory sunrpc May 17 00:53:10.060711 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.064711 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.069237 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.073359 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.077673 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.086102 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.090746 kernel: Failed to create system directory sunrpc May 17 00:53:10.090854 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.099752 kernel: Failed to create system directory sunrpc May 17 00:53:10.099904 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.108446 kernel: Failed to create system directory sunrpc May 17 00:53:10.108556 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.117463 kernel: Failed to create system directory sunrpc May 17 00:53:10.117643 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.127089 kernel: Failed to create system directory sunrpc May 17 00:53:10.127199 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.135177 kernel: Failed to create system directory sunrpc May 17 00:53:10.135227 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.143446 kernel: Failed to create system directory sunrpc May 17 00:53:10.143502 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.151920 kernel: Failed to create system directory sunrpc May 17 00:53:10.151984 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.160567 kernel: Failed to create system directory sunrpc May 17 00:53:10.160707 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.171214 kernel: Failed to create system directory sunrpc May 17 00:53:10.171458 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.179770 kernel: Failed to create system directory sunrpc May 17 00:53:10.179930 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.188052 kernel: Failed to create system directory sunrpc May 17 00:53:10.188208 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.196962 kernel: Failed to create system directory sunrpc May 17 00:53:10.197136 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.207494 kernel: Failed to create system directory sunrpc May 17 00:53:10.207584 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.216250 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.221065 kernel: Failed to create system directory sunrpc May 17 00:53:10.221166 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.225695 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.229553 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.233697 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.237900 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.242780 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.251162 kernel: Failed to create system directory sunrpc May 17 00:53:10.251288 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.254922 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.260833 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.264851 kernel: Failed to create system directory sunrpc May 17 00:53:09.712000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.284115 kernel: RPC: Registered named UNIX socket transport module. May 17 00:53:10.284272 kernel: RPC: Registered udp transport module. May 17 00:53:10.284298 kernel: RPC: Registered tcp transport module. May 17 00:53:10.288073 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. May 17 00:53:09.712000 audit[3447]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaae1a46560 a1=14a72c a2=aaaad52fe028 a3=aaaae17d8010 items=6 ppid=551 pid=3447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:53:09.712000 audit: CWD cwd="/" May 17 00:53:09.712000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:09.712000 audit: PATH item=1 name=(null) inode=22178 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:09.712000 audit: PATH item=2 name=(null) inode=22178 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:09.712000 audit: PATH item=3 name=(null) inode=22179 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:09.712000 audit: PATH item=4 name=(null) inode=22178 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:09.712000 audit: PATH item=5 name=(null) inode=22180 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:53:09.712000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.384933 kernel: Failed to create system directory nfs May 17 00:53:10.385035 kernel: Failed to create system directory nfs May 17 00:53:10.385138 kernel: Failed to create system directory nfs May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.393613 kernel: Failed to create system directory nfs May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.398058 kernel: Failed to create system directory nfs May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.403209 kernel: Failed to create system directory nfs May 17 00:53:10.403437 kernel: Failed to create system directory nfs May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.412491 kernel: Failed to create system directory nfs May 17 00:53:10.412669 kernel: Failed to create system directory nfs May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.421075 kernel: Failed to create system directory nfs May 17 00:53:10.421192 kernel: Failed to create system directory nfs May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.430925 kernel: Failed to create system directory nfs May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.435691 kernel: Failed to create system directory nfs May 17 00:53:10.435878 kernel: Failed to create system directory nfs May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.443509 kernel: Failed to create system directory nfs May 17 00:53:10.443668 kernel: Failed to create system directory nfs May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.451243 kernel: Failed to create system directory nfs May 17 00:53:10.451559 kernel: Failed to create system directory nfs May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.460714 kernel: Failed to create system directory nfs May 17 00:53:10.461323 kernel: Failed to create system directory nfs May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.472679 kernel: Failed to create system directory nfs May 17 00:53:10.472813 kernel: Failed to create system directory nfs May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.480408 kernel: Failed to create system directory nfs May 17 00:53:10.480614 kernel: Failed to create system directory nfs May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.485173 kernel: Failed to create system directory nfs May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.492564 kernel: Failed to create system directory nfs May 17 00:53:10.492729 kernel: Failed to create system directory nfs May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.501317 kernel: Failed to create system directory nfs May 17 00:53:10.501503 kernel: Failed to create system directory nfs May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.505439 kernel: Failed to create system directory nfs May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.509089 kernel: Failed to create system directory nfs May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.516824 kernel: Failed to create system directory nfs May 17 00:53:10.516884 kernel: Failed to create system directory nfs May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.524433 kernel: Failed to create system directory nfs May 17 00:53:10.524520 kernel: Failed to create system directory nfs May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.533030 kernel: Failed to create system directory nfs May 17 00:53:10.533157 kernel: Failed to create system directory nfs May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.540666 kernel: Failed to create system directory nfs May 17 00:53:10.540781 kernel: Failed to create system directory nfs May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.548698 kernel: Failed to create system directory nfs May 17 00:53:10.548846 kernel: Failed to create system directory nfs May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.555924 kernel: Failed to create system directory nfs May 17 00:53:10.556042 kernel: Failed to create system directory nfs May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.560115 kernel: Failed to create system directory nfs May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.571720 kernel: Failed to create system directory nfs May 17 00:53:10.571844 kernel: Failed to create system directory nfs May 17 00:53:10.571866 kernel: Failed to create system directory nfs May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.580925 kernel: Failed to create system directory nfs May 17 00:53:10.581058 kernel: Failed to create system directory nfs May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.588059 kernel: Failed to create system directory nfs May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.592330 kernel: Failed to create system directory nfs May 17 00:53:10.592432 kernel: Failed to create system directory nfs May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.595987 kernel: Failed to create system directory nfs May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.599736 kernel: Failed to create system directory nfs May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.603338 kernel: Failed to create system directory nfs May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.607257 kernel: Failed to create system directory nfs May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.610882 kernel: Failed to create system directory nfs May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.614828 kernel: Failed to create system directory nfs May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.622261 kernel: Failed to create system directory nfs May 17 00:53:10.622355 kernel: Failed to create system directory nfs May 17 00:53:10.369000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.369000 audit[3447]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaae1bef9f0 a1=1162dc a2=aaaad52fe028 a3=aaaae17d8010 items=0 ppid=551 pid=3447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:53:10.650051 kernel: FS-Cache: Netfs 'nfs' registered for caching May 17 00:53:10.369000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.725217 kernel: Failed to create system directory nfs4 May 17 00:53:10.725289 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.729112 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.733459 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.737337 kernel: Failed to create system directory nfs4 May 17 00:53:10.737481 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.741414 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.745114 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.756790 kernel: Failed to create system directory nfs4 May 17 00:53:10.756918 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.761793 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.765777 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.774054 kernel: Failed to create system directory nfs4 May 17 00:53:10.774165 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.782060 kernel: Failed to create system directory nfs4 May 17 00:53:10.782177 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.785749 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.789570 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.793733 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.797551 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.805474 kernel: Failed to create system directory nfs4 May 17 00:53:10.805572 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.809451 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.813349 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.817218 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.827441 kernel: Failed to create system directory nfs4 May 17 00:53:10.827565 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.834286 kernel: Failed to create system directory nfs4 May 17 00:53:10.834421 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.839069 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.845494 kernel: Failed to create system directory nfs4 May 17 00:53:10.845601 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.853167 kernel: Failed to create system directory nfs4 May 17 00:53:10.853209 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.862441 kernel: Failed to create system directory nfs4 May 17 00:53:10.862525 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.866244 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.870575 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.878646 kernel: Failed to create system directory nfs4 May 17 00:53:10.878737 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.882478 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.886231 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.890368 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.894349 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.898160 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.902514 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.907054 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.911326 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.923096 kernel: Failed to create system directory nfs4 May 17 00:53:10.923217 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.930990 kernel: Failed to create system directory nfs4 May 17 00:53:10.931072 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.938702 kernel: Failed to create system directory nfs4 May 17 00:53:10.938780 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.946358 kernel: Failed to create system directory nfs4 May 17 00:53:10.946412 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.950084 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.957700 kernel: Failed to create system directory nfs4 May 17 00:53:10.957762 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.966763 kernel: Failed to create system directory nfs4 May 17 00:53:10.966816 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.974808 kernel: Failed to create system directory nfs4 May 17 00:53:10.974925 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.983200 kernel: Failed to create system directory nfs4 May 17 00:53:10.983279 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.991554 kernel: Failed to create system directory nfs4 May 17 00:53:10.991646 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.999662 kernel: Failed to create system directory nfs4 May 17 00:53:10.999706 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:11.007635 kernel: Failed to create system directory nfs4 May 17 00:53:11.007744 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:11.017369 kernel: Failed to create system directory nfs4 May 17 00:53:11.017491 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:11.024592 kernel: Failed to create system directory nfs4 May 17 00:53:11.024686 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:11.035711 kernel: Failed to create system directory nfs4 May 17 00:53:11.036066 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:11.040115 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:11.044354 kubelet[1912]: E0517 00:53:11.044270 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:53:11.048401 kernel: Failed to create system directory nfs4 May 17 00:53:11.048524 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:11.052109 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:11.056014 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:11.059805 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:11.063823 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:11.072367 kernel: Failed to create system directory nfs4 May 17 00:53:11.072468 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:11.076358 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:11.080322 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:11.088232 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:11.093826 kernel: Failed to create system directory nfs4 May 17 00:53:11.093975 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:11.101400 kernel: Failed to create system directory nfs4 May 17 00:53:11.101557 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:11.105430 kernel: Failed to create system directory nfs4 May 17 00:53:10.710000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:11.216105 kernel: NFS: Registering the id_resolver key type May 17 00:53:11.216296 kernel: Key type id_resolver registered May 17 00:53:11.216328 kernel: Key type id_legacy registered May 17 00:53:10.710000 audit[3458]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff87b3a010 a1=19c694 a2=aaaac11ae028 a3=aaaac388c010 items=0 ppid=551 pid=3458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:53:10.710000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 May 17 00:53:11.257000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:11.257000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:11.265147 kernel: Failed to create system directory rpcgss May 17 00:53:11.257000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:11.275645 kernel: Failed to create system directory rpcgss May 17 00:53:11.275775 kernel: Failed to create system directory rpcgss May 17 00:53:11.257000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:11.280105 kernel: Failed to create system directory rpcgss May 17 00:53:11.257000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:11.284475 kernel: Failed to create system directory rpcgss May 17 00:53:11.257000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:11.288915 kernel: Failed to create system directory rpcgss May 17 00:53:11.257000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:11.293218 kernel: Failed to create system directory rpcgss May 17 00:53:11.257000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:11.297680 kernel: Failed to create system directory rpcgss May 17 00:53:11.257000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:11.302128 kernel: Failed to create system directory rpcgss May 17 00:53:11.302211 kernel: Failed to create system directory rpcgss May 17 00:53:11.257000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:11.257000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:11.312279 kernel: Failed to create system directory rpcgss May 17 00:53:11.312434 kernel: Failed to create system directory rpcgss May 17 00:53:11.257000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:11.257000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:11.320872 kernel: Failed to create system directory rpcgss May 17 00:53:11.320979 kernel: Failed to create system directory rpcgss May 17 00:53:11.257000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:11.257000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:11.329228 kernel: Failed to create system directory rpcgss May 17 00:53:11.329277 kernel: Failed to create system directory rpcgss May 17 00:53:11.257000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:11.257000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:11.337635 kernel: Failed to create system directory rpcgss May 17 00:53:11.337773 kernel: Failed to create system directory rpcgss May 17 00:53:11.257000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:11.257000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:11.348143 kernel: Failed to create system directory rpcgss May 17 00:53:11.348311 kernel: Failed to create system directory rpcgss May 17 00:53:11.257000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:11.257000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:11.356079 kernel: Failed to create system directory rpcgss May 17 00:53:11.356182 kernel: Failed to create system directory rpcgss May 17 00:53:11.257000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:11.257000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:11.364208 kernel: Failed to create system directory rpcgss May 17 00:53:11.364355 kernel: Failed to create system directory rpcgss May 17 00:53:11.257000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:11.369056 kernel: Failed to create system directory rpcgss May 17 00:53:11.257000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:11.257000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:53:11.377625 kernel: Failed to create system directory rpcgss May 17 00:53:11.257000 audit[3459]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffffb7872010 a1=5ee7c a2=aaaadb99e028 a3=aaaae5f7f010 items=0 ppid=551 pid=3459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:53:11.257000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 May 17 00:53:11.634376 nfsidmap[3464]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.7-n-cf89ee32d5' May 17 00:53:11.644918 nfsidmap[3465]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.7-n-cf89ee32d5' May 17 00:53:11.665000 audit[1552]: AVC avc: denied { watch_reads } for pid=1552 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2814 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:53:11.665000 audit[1552]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaac32d5ac0 a2=10 a3=0 items=0 ppid=1 pid=1552 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:53:11.665000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 17 00:53:11.665000 audit[1552]: AVC avc: denied { watch_reads } for pid=1552 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2814 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:53:11.665000 audit[1552]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaac32d5ac0 a2=10 a3=0 items=0 ppid=1 pid=1552 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:53:11.665000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 17 00:53:11.665000 audit[1552]: AVC avc: denied { watch_reads } for pid=1552 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2814 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:53:11.665000 audit[1552]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaac32d5ac0 a2=10 a3=0 items=0 ppid=1 pid=1552 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:53:11.665000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 17 00:53:11.665000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2814 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:53:11.665000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2814 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:53:11.665000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2814 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:53:11.710738 env[1446]: time="2025-05-17T00:53:11.710674876Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:4f504b5b-c85d-4d21-983d-69ae5ee9a038,Namespace:default,Attempt:0,}" May 17 00:53:11.869981 systemd-networkd[1608]: cali5ec59c6bf6e: Link UP May 17 00:53:11.880120 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:53:11.887160 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready May 17 00:53:11.887834 systemd-networkd[1608]: cali5ec59c6bf6e: Gained carrier May 17 00:53:11.904830 env[1446]: 2025-05-17 00:53:11.791 [INFO][3467] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.32-k8s-test--pod--1-eth0 default 4f504b5b-c85d-4d21-983d-69ae5ee9a038 1779 0 2025-05-17 00:52:43 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.32 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="86a747869b852e1863ee0073b43a733c9544b98f335331e0cbe5fd2071a07f91" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.32-k8s-test--pod--1-" May 17 00:53:11.904830 env[1446]: 2025-05-17 00:53:11.792 [INFO][3467] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="86a747869b852e1863ee0073b43a733c9544b98f335331e0cbe5fd2071a07f91" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.32-k8s-test--pod--1-eth0" May 17 00:53:11.904830 env[1446]: 2025-05-17 00:53:11.821 [INFO][3480] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="86a747869b852e1863ee0073b43a733c9544b98f335331e0cbe5fd2071a07f91" HandleID="k8s-pod-network.86a747869b852e1863ee0073b43a733c9544b98f335331e0cbe5fd2071a07f91" Workload="10.200.20.32-k8s-test--pod--1-eth0" May 17 00:53:11.904830 env[1446]: 2025-05-17 00:53:11.822 [INFO][3480] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="86a747869b852e1863ee0073b43a733c9544b98f335331e0cbe5fd2071a07f91" HandleID="k8s-pod-network.86a747869b852e1863ee0073b43a733c9544b98f335331e0cbe5fd2071a07f91" Workload="10.200.20.32-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002d7020), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.32", "pod":"test-pod-1", "timestamp":"2025-05-17 00:53:11.821528327 +0000 UTC"}, Hostname:"10.200.20.32", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:53:11.904830 env[1446]: 2025-05-17 00:53:11.822 [INFO][3480] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:53:11.904830 env[1446]: 2025-05-17 00:53:11.822 [INFO][3480] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:53:11.904830 env[1446]: 2025-05-17 00:53:11.822 [INFO][3480] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.32' May 17 00:53:11.904830 env[1446]: 2025-05-17 00:53:11.835 [INFO][3480] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.86a747869b852e1863ee0073b43a733c9544b98f335331e0cbe5fd2071a07f91" host="10.200.20.32" May 17 00:53:11.904830 env[1446]: 2025-05-17 00:53:11.840 [INFO][3480] ipam/ipam.go 394: Looking up existing affinities for host host="10.200.20.32" May 17 00:53:11.904830 env[1446]: 2025-05-17 00:53:11.845 [INFO][3480] ipam/ipam.go 511: Trying affinity for 192.168.31.128/26 host="10.200.20.32" May 17 00:53:11.904830 env[1446]: 2025-05-17 00:53:11.847 [INFO][3480] ipam/ipam.go 158: Attempting to load block cidr=192.168.31.128/26 host="10.200.20.32" May 17 00:53:11.904830 env[1446]: 2025-05-17 00:53:11.849 [INFO][3480] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.31.128/26 host="10.200.20.32" May 17 00:53:11.904830 env[1446]: 2025-05-17 00:53:11.849 [INFO][3480] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.31.128/26 handle="k8s-pod-network.86a747869b852e1863ee0073b43a733c9544b98f335331e0cbe5fd2071a07f91" host="10.200.20.32" May 17 00:53:11.904830 env[1446]: 2025-05-17 00:53:11.850 [INFO][3480] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.86a747869b852e1863ee0073b43a733c9544b98f335331e0cbe5fd2071a07f91 May 17 00:53:11.904830 env[1446]: 2025-05-17 00:53:11.855 [INFO][3480] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.31.128/26 handle="k8s-pod-network.86a747869b852e1863ee0073b43a733c9544b98f335331e0cbe5fd2071a07f91" host="10.200.20.32" May 17 00:53:11.904830 env[1446]: 2025-05-17 00:53:11.864 [INFO][3480] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.31.132/26] block=192.168.31.128/26 handle="k8s-pod-network.86a747869b852e1863ee0073b43a733c9544b98f335331e0cbe5fd2071a07f91" host="10.200.20.32" May 17 00:53:11.904830 env[1446]: 2025-05-17 00:53:11.864 [INFO][3480] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.31.132/26] handle="k8s-pod-network.86a747869b852e1863ee0073b43a733c9544b98f335331e0cbe5fd2071a07f91" host="10.200.20.32" May 17 00:53:11.904830 env[1446]: 2025-05-17 00:53:11.864 [INFO][3480] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:53:11.904830 env[1446]: 2025-05-17 00:53:11.864 [INFO][3480] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.31.132/26] IPv6=[] ContainerID="86a747869b852e1863ee0073b43a733c9544b98f335331e0cbe5fd2071a07f91" HandleID="k8s-pod-network.86a747869b852e1863ee0073b43a733c9544b98f335331e0cbe5fd2071a07f91" Workload="10.200.20.32-k8s-test--pod--1-eth0" May 17 00:53:11.904830 env[1446]: 2025-05-17 00:53:11.866 [INFO][3467] cni-plugin/k8s.go 418: Populated endpoint ContainerID="86a747869b852e1863ee0073b43a733c9544b98f335331e0cbe5fd2071a07f91" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.32-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.32-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"4f504b5b-c85d-4d21-983d-69ae5ee9a038", ResourceVersion:"1779", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 52, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.32", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.31.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:53:11.907629 env[1446]: 2025-05-17 00:53:11.866 [INFO][3467] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.31.132/32] ContainerID="86a747869b852e1863ee0073b43a733c9544b98f335331e0cbe5fd2071a07f91" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.32-k8s-test--pod--1-eth0" May 17 00:53:11.907629 env[1446]: 2025-05-17 00:53:11.866 [INFO][3467] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="86a747869b852e1863ee0073b43a733c9544b98f335331e0cbe5fd2071a07f91" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.32-k8s-test--pod--1-eth0" May 17 00:53:11.907629 env[1446]: 2025-05-17 00:53:11.888 [INFO][3467] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="86a747869b852e1863ee0073b43a733c9544b98f335331e0cbe5fd2071a07f91" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.32-k8s-test--pod--1-eth0" May 17 00:53:11.907629 env[1446]: 2025-05-17 00:53:11.889 [INFO][3467] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="86a747869b852e1863ee0073b43a733c9544b98f335331e0cbe5fd2071a07f91" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.32-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.32-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"4f504b5b-c85d-4d21-983d-69ae5ee9a038", ResourceVersion:"1779", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 52, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.32", ContainerID:"86a747869b852e1863ee0073b43a733c9544b98f335331e0cbe5fd2071a07f91", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.31.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"0a:54:e7:8a:8c:83", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:53:11.907629 env[1446]: 2025-05-17 00:53:11.899 [INFO][3467] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="86a747869b852e1863ee0073b43a733c9544b98f335331e0cbe5fd2071a07f91" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.32-k8s-test--pod--1-eth0" May 17 00:53:11.913000 audit[3497]: NETFILTER_CFG table=filter:82 family=2 entries=40 op=nft_register_chain pid=3497 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:53:11.913000 audit[3497]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20336 a0=3 a1=ffffef09b090 a2=0 a3=ffff95d04fa8 items=0 ppid=2771 pid=3497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:53:11.913000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:53:11.919877 env[1446]: time="2025-05-17T00:53:11.919711594Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:53:11.919877 env[1446]: time="2025-05-17T00:53:11.919756116Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:53:11.919877 env[1446]: time="2025-05-17T00:53:11.919766796Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:53:11.920413 env[1446]: time="2025-05-17T00:53:11.920329649Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/86a747869b852e1863ee0073b43a733c9544b98f335331e0cbe5fd2071a07f91 pid=3506 runtime=io.containerd.runc.v2 May 17 00:53:11.936878 systemd[1]: Started cri-containerd-86a747869b852e1863ee0073b43a733c9544b98f335331e0cbe5fd2071a07f91.scope. May 17 00:53:11.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:11.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:11.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:11.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:11.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:11.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:11.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:11.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:11.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:11.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:11.954000 audit: BPF prog-id=127 op=LOAD May 17 00:53:11.954000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:11.954000 audit[3516]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3506 pid=3516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:53:11.954000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836613734373836396238353265313836336565303037336234336137 May 17 00:53:11.955000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:11.955000 audit[3516]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3506 pid=3516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:53:11.955000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836613734373836396238353265313836336565303037336234336137 May 17 00:53:11.955000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:11.955000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:11.955000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:11.955000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:11.955000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:11.955000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:11.955000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:11.955000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:11.955000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:11.955000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:11.955000 audit: BPF prog-id=128 op=LOAD May 17 00:53:11.955000 audit[3516]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3506 pid=3516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:53:11.955000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836613734373836396238353265313836336565303037336234336137 May 17 00:53:11.955000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:11.955000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:11.955000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:11.955000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:11.955000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:11.955000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:11.955000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:11.955000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:11.955000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:11.955000 audit: BPF prog-id=129 op=LOAD May 17 00:53:11.955000 audit[3516]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3506 pid=3516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:53:11.955000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836613734373836396238353265313836336565303037336234336137 May 17 00:53:11.955000 audit: BPF prog-id=129 op=UNLOAD May 17 00:53:11.955000 audit: BPF prog-id=128 op=UNLOAD May 17 00:53:11.955000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:11.955000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:11.955000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:11.955000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:11.955000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:11.955000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:11.955000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:11.955000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:11.955000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:11.955000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:11.955000 audit: BPF prog-id=130 op=LOAD May 17 00:53:11.955000 audit[3516]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3506 pid=3516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:53:11.955000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836613734373836396238353265313836336565303037336234336137 May 17 00:53:11.980696 env[1446]: time="2025-05-17T00:53:11.980639731Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:4f504b5b-c85d-4d21-983d-69ae5ee9a038,Namespace:default,Attempt:0,} returns sandbox id \"86a747869b852e1863ee0073b43a733c9544b98f335331e0cbe5fd2071a07f91\"" May 17 00:53:11.982599 env[1446]: time="2025-05-17T00:53:11.982558137Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 17 00:53:12.045308 kubelet[1912]: E0517 00:53:12.045252 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:53:12.299724 env[1446]: time="2025-05-17T00:53:12.299655377Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:53:12.307121 env[1446]: time="2025-05-17T00:53:12.307065072Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:e8b1cb61bd96acc3ff3c695318c9cc691213d532eee3731d038af92816fcb5f4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:53:12.311598 env[1446]: time="2025-05-17T00:53:12.311482136Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:53:12.317313 env[1446]: time="2025-05-17T00:53:12.317247232Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:53:12.318231 env[1446]: time="2025-05-17T00:53:12.318195574Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:e8b1cb61bd96acc3ff3c695318c9cc691213d532eee3731d038af92816fcb5f4\"" May 17 00:53:12.326632 env[1446]: time="2025-05-17T00:53:12.326586892Z" level=info msg="CreateContainer within sandbox \"86a747869b852e1863ee0073b43a733c9544b98f335331e0cbe5fd2071a07f91\" for container &ContainerMetadata{Name:test,Attempt:0,}" May 17 00:53:12.375660 env[1446]: time="2025-05-17T00:53:12.375598247Z" level=info msg="CreateContainer within sandbox \"86a747869b852e1863ee0073b43a733c9544b98f335331e0cbe5fd2071a07f91\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"dc639be0b9dc36a7d28037e2ead8c95e3d4837460e9e81a78be4b09ff9e6974c\"" May 17 00:53:12.376831 env[1446]: time="2025-05-17T00:53:12.376783395Z" level=info msg="StartContainer for \"dc639be0b9dc36a7d28037e2ead8c95e3d4837460e9e81a78be4b09ff9e6974c\"" May 17 00:53:12.397244 systemd[1]: Started cri-containerd-dc639be0b9dc36a7d28037e2ead8c95e3d4837460e9e81a78be4b09ff9e6974c.scope. May 17 00:53:12.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:12.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:12.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:12.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:12.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:12.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:12.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:12.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:12.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:12.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:12.413000 audit: BPF prog-id=131 op=LOAD May 17 00:53:12.413000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:12.413000 audit[3548]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3506 pid=3548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:53:12.413000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463363339626530623964633336613764323830333765326561643863 May 17 00:53:12.413000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:12.413000 audit[3548]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3506 pid=3548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:53:12.413000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463363339626530623964633336613764323830333765326561643863 May 17 00:53:12.414000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:12.414000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:12.414000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:12.414000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:12.414000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:12.414000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:12.414000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:12.414000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:12.414000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:12.414000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:12.414000 audit: BPF prog-id=132 op=LOAD May 17 00:53:12.414000 audit[3548]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3506 pid=3548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:53:12.414000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463363339626530623964633336613764323830333765326561643863 May 17 00:53:12.414000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:12.414000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:12.414000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:12.414000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:12.414000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:12.414000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:12.414000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:12.414000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:12.414000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:12.414000 audit: BPF prog-id=133 op=LOAD May 17 00:53:12.414000 audit[3548]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3506 pid=3548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:53:12.414000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463363339626530623964633336613764323830333765326561643863 May 17 00:53:12.415000 audit: BPF prog-id=133 op=UNLOAD May 17 00:53:12.415000 audit: BPF prog-id=132 op=UNLOAD May 17 00:53:12.415000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:12.415000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:12.415000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:12.415000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:12.415000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:12.415000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:12.415000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:12.415000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:12.415000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:12.415000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:53:12.415000 audit: BPF prog-id=134 op=LOAD May 17 00:53:12.415000 audit[3548]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3506 pid=3548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:53:12.415000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463363339626530623964633336613764323830333765326561643863 May 17 00:53:12.435294 env[1446]: time="2025-05-17T00:53:12.435240533Z" level=info msg="StartContainer for \"dc639be0b9dc36a7d28037e2ead8c95e3d4837460e9e81a78be4b09ff9e6974c\" returns successfully" May 17 00:53:12.967268 systemd-networkd[1608]: cali5ec59c6bf6e: Gained IPv6LL May 17 00:53:13.046438 kubelet[1912]: E0517 00:53:13.046383 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:53:14.046905 kubelet[1912]: E0517 00:53:14.046864 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:53:15.047426 kubelet[1912]: E0517 00:53:15.047389 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:53:16.047961 kubelet[1912]: E0517 00:53:16.047914 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:53:17.049505 kubelet[1912]: E0517 00:53:17.049459 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:53:18.050021 kubelet[1912]: E0517 00:53:18.049971 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:53:19.050505 kubelet[1912]: E0517 00:53:19.050471 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:53:20.051954 kubelet[1912]: E0517 00:53:20.051909 1912 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"